Category: CyberSecurityNews

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT
13
Sep
2025

New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT

Cybersecurity researchers have uncovered a sophisticated malware campaign that exploits SVG (Scalable Vector Graphics) files and email attachments to distribute…

ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
13
Sep
2025

ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email

A newly introduced feature in ChatGPT that allows it to connect with personal data applications can be exploited by attackers…

Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently
12
Sep
2025

Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently

A sudden and definitive statement emerged from the “Scattered LAPSUS$ Hunters 4.0” Telegram channel on September 8, signaling an abrupt…

AI-powered Pentesting Tool 'Villager' Combines Kali Linux Tools with DeepSeek AI for Automated Attacks
12
Sep
2025

AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks

New AI-powered penetration testing framework Villager combines Kali Linux toolsets with DeepSeek AI models to fully automate cyber attack workflows….

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
12
Sep
2025

Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts

The notorious APT-C-24 threat actor group, commonly known as Sidewinder or Rattlesnake, has evolved its attack methodology by deploying sophisticated…

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence
12
Sep
2025

New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence

Since its first appearance earlier this year, the ToneShell backdoor has demonstrated a remarkable capacity for adaptation, toyed with by…

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code
12
Sep
2025

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…

K2 Think AI Model Jailbroken Within Hours After The Release
12
Sep
2025

K2 Think AI Model Jailbroken Within Hours After The Release

Within mere hours of its public unveiling, the K2 Think model experienced a critical compromise that has sent ripples throughout…

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems
12
Sep
2025

New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems

In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya…

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2
12
Sep
2025

Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2

A new kernel address leak vulnerability has been discovered in the latest versions of Windows 11 (24H2) and Windows Server…

New Clickfix Attack Promises "Free WiFi" But Delivers Powershell Based Malware
12
Sep
2025

New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware

The Cybersecuritynews researcher team uncovered a sophisticated social engineering campaign that is exploiting the public’s need for free internet access,…

New Malware Using Azure Functions For Hosting Command And Control Infrastructure
12
Sep
2025

New Malware Using Azure Functions For Hosting Command And Control Infrastructure

A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel…