Category: CyberSecurityNews

Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes
29
Sep
2025

Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes

Cybersecurity researchers are raising alarms about a growing threat vector as malicious actors increasingly exploit Dynamic DNS providers to establish…

Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code
29
Sep
2025

Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code

A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code…

Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization
28
Sep
2025

Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization

A Google Project Zero researcher has detailed a novel technique for remotely leaking memory addresses on Apple’s macOS and iOS….

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations
27
Sep
2025

Malware Operators Collaborate With Covert North Korean IT Workers to Attack Corporate Organizations

A sophisticated cybercriminal alliance between malware operators and covert North Korean IT workers has emerged as a significant threat to…

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware
27
Sep
2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and…

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users
27
Sep
2025

Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users

A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions….

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
27
Sep
2025

New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads

A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices across the globe. The campaign…

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups
27
Sep
2025

Researchers Uncovered Connections Between LAPSUS$, Scattered Spider, and ShinyHunters Hacker Groups

The cybersecurity landscape continues to evolve as three of the most notorious English-speaking cybercrime groups—LAPSUS$, Scattered Spider, and ShinyHunters—have been…

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
27
Sep
2025

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July 2025….

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach
27
Sep
2025

LummaStealer Technical Details Uncovered Using ML-Based Detection Approach

LummaStealer has emerged as one of the most prolific information-stealing malware families in recent years, targeting victims across multiple industry…

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
27
Sep
2025

17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released

A 17-year-old suspect who surrendered over his alleged role in the 2023 cyberattacks against two major Las Vegas casino operators…

LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft
26
Sep
2025

LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft

A sophisticated new threat has emerged in the cybersecurity landscape that represents a significant evolution in malware development. The LAMEHUG…