Category: CyberSecurityNews

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor
26
Sep
2025

RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor

In mid-2024, cybersecurity professionals began observing a surge of targeted intrusions against government, defense, and technology organizations worldwide. These incidents…

New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials
26
Sep
2025

New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials

A sophisticated phishing campaign has emerged targeting maintainers of packages on the Python Package Index (PyPI), employing domain confusion tactics…

Threat Actor’s Using Copyright Takedown Claims to Deploy Malware
26
Sep
2025

Threat Actor’s Using Copyright Takedown Claims to Deploy Malware

A sophisticated malware campaign orchestrated by the Vietnamese Lone None threat actor group has been leveraging fraudulent copyright infringement takedown…

Hackers Injecting Exploiting WordPress Websites With Silent Malware to Gain Admin Access
26
Sep
2025

Hackers Injecting Exploiting WordPress Websites With Silent Malware to Gain Admin Access

A sophisticated malware campaign targeting WordPress websites has been discovered employing advanced steganographic techniques and persistent backdoor mechanisms to maintain…

New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware
25
Sep
2025

New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware

A recent wave of attacks leveraging malicious Windows shortcut files (.LNK) has put security teams on high alert. Emerging in…

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk
25
Sep
2025

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk…

Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data
25
Sep
2025

Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

A critical vulnerability chain in Salesforce’s Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM data….

25
Sep
2025

Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

A critical vulnerability chain in Salesforce’s Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM data….

Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets
25
Sep
2025

Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets

Cybercriminals have orchestrated a sophisticated phishing campaign exploiting GitHub’s notification system to impersonate the prestigious startup accelerator Y Combinator, targeting…

Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data
25
Sep
2025

Cisco IOS and XE Vulnerability Let Remote Attacker Bypass Authentication and Access Sensitive Data

A critical vulnerability in the implementation of the TACACS+ protocol for Cisco IOS and IOS XE Software could allow an…

New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors
25
Sep
2025

New BRICKSTORM Stealthy Backdoor Attacking Tech and Legal Sectors

BRICKSTORM has surfaced as a highly evasive backdoor targeting organizations within the technology and legal industries, exploiting trust relationships to…

SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes
25
Sep
2025

SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes

SetupHijack, an open-source research utility, has emerged as a powerful method for red teaming and security research by targeting race…