Category: CyberSecurityNews

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
26
Oct
2025

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments

The notorious LockBit ransomware operation has resurfaced with a vengeance after months of dormancy following Operation Cronos takedown efforts in…

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
26
Oct
2025

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting attackers complete control…

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
26
Oct
2025

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Southeast Asia’s online gambling ecosystem has become a breeding ground for sophisticated cyber threats, with criminal networks leveraging seemingly legitimate…

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
25
Oct
2025

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials

Cybercriminals have adopted a sophisticated social engineering strategy that exploits the trust inherent in job hunting, according to a recent…

Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules
25
Oct
2025

Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

A sophisticated cyberattack campaign targeting Microsoft Internet Information Services (IIS) servers has emerged, exploiting decades-old security vulnerabilities to deploy malicious…

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
25
Oct
2025

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways

A sophisticated phishing campaign leveraging randomly generated Universal Unique Identifiers (UUIDs) has emerged, successfully bypassing Secure Email Gateways (SEGs) and…

North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
25
Oct
2025

North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data

North Korean state-sponsored hackers from the Lazarus APT group launched a cyberespionage campaign targeting European companies involved in unmanned aerial…

OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
25
Oct
2025

OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

OpenAI’s newly launched ChatGPT Atlas browser, designed to blend AI assistance with web navigation, faces a serious security flaw that…

Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks
25
Oct
2025

Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks

In 2025, ransomware attacks against the public sector continue to accelerate at an alarming rate, showing no signs of slowing…

Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys
25
Oct
2025

Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys

A sophisticated supply chain attack has emerged targeting cryptocurrency developers through the NuGet package ecosystem. Cybersecurity researchers have uncovered malicious…

Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network
25
Oct
2025

Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network

Microsoft is about to launch a new feature in Teams that will help hybrid workers stay connected. This feature will…

New Caminho Malware Loader Uses LSB Steganography and to Hide .NET Payloads Within Image Files
25
Oct
2025

New Caminho Malware Loader Uses LSB Steganography and to Hide .NET Payloads Within Image Files

A sophisticated malware operation has emerged from Brazil, leveraging advanced steganographic techniques to conceal malicious payloads within seemingly harmless image…