Category: CyberSecurityNews

FreeBSD-based OPNsense firewall Released for Security Issues and Improvements
07
Nov
2025

FreeBSD-based OPNsense firewall Released for Security Issues and Improvements

OPNsense has released an update focused on eliminating security vulnerabilities and improving firewall performance. The latest version includes third-party security…

Cisco Identity Services Engine Vulnerability Allows Attackers to Restart ISE unexpectedly
07
Nov
2025

Cisco Identity Services Engine Vulnerability Allows Attackers to Restart ISE unexpectedly

A critical vulnerability in Cisco Identity Services Engine (ISE) could allow remote attackers to crash the system through a crafted…

NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code
07
Nov
2025

NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code

NVIDIA has patched a critical vulnerability in its App for Windows that could allow local attackers to execute arbitrary code…

Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload
07
Nov
2025

Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload

The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis. This persistent…

Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares
07
Nov
2025

Sandworm Hackers Attacking Ukranian Organizations with Data Wiper Malwares

The Russia-aligned Sandworm threat group has intensified its destructive cyberattacks against Ukrainian organizations, deploying sophisticated data wiper malware designed to…

AI Browsers Bypass Content PayWall Mimicking as a Human-User
07
Nov
2025

AI Browsers Bypass Content PayWall Mimicking as a Human-User

The emergence of advanced AI browsing platforms such as OpenAI’s Atlas and Perplexity’s Comet has created a sophisticated challenge for…

Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery
06
Nov
2025

Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery

The cybersecurity landscape continues to evolve as new ransomware variants emerge from the remnants of previous campaigns. Midnight ransomware represents…

Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools
06
Nov
2025

Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools

A previously unidentified Iranian threat actor has emerged with sophisticated social engineering tactics aimed at academics and foreign policy experts…

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users
06
Nov
2025

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users

ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and…

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server
06
Nov
2025

Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server

North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors. Recent security discoveries reveal…

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities
06
Nov
2025

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities

The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious…

Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication
06
Nov
2025

Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication

Security researchers have uncovered a sophisticated new malware family targeting enterprise environments through a supply chain compromise. The malware, tracked…