Category: CyberSecurityNews

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code
06
Nov
2025

Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code

Cisco has disclosed multiple critical vulnerabilities in Unified Contact Center Express (CCX) that allow unauthenticated remote attackers to execute malicious…

Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders
06
Nov
2025

Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders

International law enforcement agencies have taken down three sophisticated fraud and money laundering networks in a coordinated operation that uncovered…

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild
06
Nov
2025

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild

Cisco has confirmed that threat actors are actively exploiting a critical remote code execution (RCE) flaw in its Secure Firewall…

Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild
06
Nov
2025

Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild

Cl0p, a prominent ransomware group operating since early 2019, has emerged as one of the most dangerous threats in the…

Cybersecurity Forecast 2026 - Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness
06
Nov
2025

Cybersecurity Forecast 2026 – Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness

The cybersecurity landscape stands at a critical inflection point as organizations prepare for unprecedented challenges in 2026. Google Cloud researchers…

NGate Malware Enables Unauthorized Cash Withdrawals at ATMs Using Victims’ Payment Cards
06
Nov
2025

NGate Malware Enables Unauthorized Cash Withdrawals at ATMs Using Victims’ Payment Cards

A sophisticated Android-based NFC relay attack dubbed NGate has emerged as a serious threat to banking security across Poland, targeting…

Google Warns of New PROMPTFLUX Malware Using Gemini API to Rewrite its Own Source Code
06
Nov
2025

Google Warns of New PROMPTFLUX Malware Using Gemini API to Rewrite its Own Source Code

Google Threat Intelligence Group (GTIG) has unveiled details of an experimental malware family called PROMPTFLUX, which leverages the company’s Gemini…

APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data
06
Nov
2025

APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data

A sophisticated espionage campaign targeting recruitment professionals has emerged, with the APT-C-60 threat group weaponizing VHDX files to compromise organizations….

Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution
06
Nov
2025

Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution

Google has rolled out an urgent security patch for its Chrome browser, addressing five vulnerabilities that could enable attackers to…

Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks
05
Nov
2025

Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks

European organizations are facing an unprecedented wave of ransomware attacks as cybercriminals increasingly integrate artificial intelligence tools into their operations….

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams
05
Nov
2025

October Sees Rise in Phishing and Ransomware Attacks, Including TyKit and Google Careers Scams

October 2025 marked a notable escalation in cyber threats, with phishing campaigns and ransomware variants exploiting trusted cloud services to…

Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges
05
Nov
2025

Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges

A privilege escalation flaw in Windows Cloud Files Mini Filter Driver has been discovered, allowing local attackers to bypass file…