Category: CyberSecurityNews

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems
25
Sep
2025

New LockBit 5.0 Ransomware Variant Attacking Windows, Linux, and ESXi Systems

Following a major law enforcement disruption in February 2024, the notorious LockBit ransomware group has resurfaced, marking its sixth anniversary…

ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data
25
Sep
2025

ZendTo Vulnerability Let Attackers Bypass Security Controls and Access Sensitive Data

A critical path traversal flaw in ZendTo has been assigned CVE-2025-34508 researchers discovered that versions 6.15–7 and prior enable authenticated…

COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH
25
Sep
2025

COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH

In recent weeks, security researchers have observed a surge in targeted attacks attributed to the COLDRIVER advanced persistent threat (APT)…

Volvo Group Discloses Data Breach After Ransomware Attack on HR Supplier
25
Sep
2025

Volvo Group Discloses Data Breach After Ransomware Attack on HR Supplier

Volvo Group North America has begun notifying employees and associates about a data breach that exposed their personal information, including…

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes
25
Sep
2025

Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes

Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the…

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges
25
Sep
2025

NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library (CVE-2025-23298) enables unauthenticated attackers to achieve remote code execution (RCE) with root…

Numerous Applications Using Google's Firebase Platform Leaking Highly Sensitive Data
25
Sep
2025

Numerous Applications Using Google’s Firebase Platform Leaking Highly Sensitive Data

Numerous mobile applications have been found to expose critical user information through misconfigured Firebase services, allowing unauthenticated attackers to access…

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic
25
Sep
2025

New Domain-fronting Attack Uses Google Meet, YouTube, Chrome and GCP to Tunnel Traffic

Organizations commonly allow traffic to core services like Google Meet, YouTube, Chrome update servers, and Google Cloud Platform (GCP) to…

Linux Kernel ksmbd Vulnerability Allows Remote Attackers to Execute Arbitrary Code
25
Sep
2025

Linux Kernel ksmbd Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A severe vulnerability in the Linux kernel’s ksmbd SMB server implementation has been disclosed, potentially allowing authenticated remote attackers to…

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information
25
Sep
2025

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

A critical vulnerability in Hikvision security cameras, first disclosed in 2017, is being actively exploited by hackers to gain unauthorized…

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
25
Sep
2025

BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features

Critical vulnerabilities discovered in Supermicro Baseboard Management Controller (BMC) firmware have exposed a troubling pattern where inadequate security fixes create…

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps
25
Sep
2025

Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps

A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate government identity…