Category: CyberSecurityNews

Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group
27
Oct
2025

Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group

The notorious Mem3nt0 mori hacker group has been actively exploiting a zero-day vulnerability in Google Chrome, compromising high-profile targets across…

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack
27
Oct
2025

HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack

HashiCorp has disclosed two critical vulnerabilities in its Vault software that could allow attackers to bypass authentication controls and launch…

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild
27
Oct
2025

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild

Hackers are actively exploiting a critical flaw in Microsoft’s Windows Server Update Services (WSUS), with security researchers reporting widespread attempts…

Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain
27
Oct
2025

Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain

The notorious cybercrime forum BreachForums has resurfaced online, this time on a clearnet domain accessible without specialized tools like Tor….

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System
27
Oct
2025

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System

Dell Technologies has disclosed three critical vulnerabilities in its Storage Manager software that could allow attackers to bypass authentication, disclose…

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
27
Oct
2025

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

A new tool called EDR-Redir has emerged, allowing attackers to redirect or isolate the executable folders of popular Endpoint Detection…

27
Oct
2025

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

A new tool called EDR-Redir has emerged, allowing attackers to redirect or isolate the executable folders of popular Endpoint Detection…

New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens
27
Oct
2025

New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens

A sophisticated phishing technique called CoPhish exploits Microsoft Copilot Studio to trick users into granting attackers unauthorized access to their…

5 Deception Solutions that are Changing the Cybersecurity Game 
26
Oct
2025

5 Deception Solutions that are Changing the Cybersecurity Game 

Cyber attackers are using new ways to breach systems, making threats hard to detect. Traditional tools like firewalls alone can’t keep up. …

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online
26
Oct
2025

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online

A high-severity vulnerability in BIND 9 resolvers has been disclosed, potentially allowing attackers to poison caches and redirect internet traffic…

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
26
Oct
2025

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments

The notorious LockBit ransomware operation has resurfaced with a vengeance after months of dormancy following Operation Cronos takedown efforts in…

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
26
Oct
2025

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting attackers complete control…