Category: CyberSecurityNews

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
03
Nov
2025

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers can exploit Anthropic’s Claude AI to steal sensitive user data. By leveraging the model’s newly added network capabilities in…

03
Nov
2025

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Hackers can exploit Anthropic’s Claude AI to steal sensitive user data. By leveraging the model’s newly added network capabilities in…

Conti Group Member Responsible for Deploying Ransomware Extradited to USA
03
Nov
2025

Conti Group Member Responsible for Deploying Ransomware Extradited to USA

A Ukrainian national accused of playing a key role in the notorious Conti ransomware operation has been extradited from Ireland…

03
Nov
2025

Beware of New Phishing Attack that Abuses Cloudflare and ZenDesk Pages to Steal Logins

A sophisticated phishing campaign has emerged, exploiting the trust placed in legitimate cloud hosting services. Threat actors are leveraging Cloudflare…

New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
03
Nov
2025

New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach

Supply chain attacks targeting the JavaScript ecosystem have evolved into sophisticated operations combining domain manipulation with social engineering. On September…

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
03
Nov
2025

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure

Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one…

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
03
Nov
2025

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files

In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents…

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets
03
Nov
2025

Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets

Proton has launched a new initiative called the Data Breach Observatory. This program reveals serious problems that exist on the…

03
Nov
2025

Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure

Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one…

New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic
03
Nov
2025

New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic

A sophisticated campaign targeting military personnel across Russia and Belarus has emerged, deploying a complex multi-stage infection chain that establishes…

Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
03
Nov
2025

Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

Multiple vulnerabilities in Microsoft’s Graphics Device Interface (GDI), a core component of the Windows operating system responsible for rendering graphics….

New BOF Tool Exploits Microsoft Teams' Cookie Encryption allowing Attackers to Access User Chats
03
Nov
2025

New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats

A specialized Beacon Object File (BOF) designed to extract authentication cookies from Microsoft Teams without disrupting the application. This development…