Category: CyberSecurityNews

Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
24
Oct
2025

Threat Actors With Stealer Malwares Processing Millions of Credentials a Day

The stealer malware ecosystem has evolved into a sophisticated criminal enterprise capable of processing hundreds of millions of credentials daily….

New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
23
Oct
2025

New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control

A sophisticated new threat has emerged in the cybersecurity landscape, leveraging the popular communication platform Discord to conduct covert operations….

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations
23
Oct
2025

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Salt Typhoon, a China-linked advanced persistent threat (APT) group active since 2019, has emerged as one of the most sophisticated…

Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
23
Oct
2025

Microsoft Enhances Windows Security by Turning Off File Previews for Downloads

In a move to tighten defenses against credential theft, Microsoft has rolled out a significant change to Windows File Explorer…

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts
23
Oct
2025

Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts

A new vulnerability in Perplexity’s Comet AI browser allows attackers to inject malicious prompts through seemingly innocuous screenshots. Disclosed on…

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
23
Oct
2025

Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs showcased an impressive achievement by successfully…

SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar
23
Oct
2025

SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

SpaceX has disabled over 2,500 Starlink satellite internet terminals linked to notorious scam centers in Myanmar. The action underscores the…

Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild
23
Oct
2025

Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild

Hackers have begun actively targeting a critical remote code execution flaw in Adobe’s Magento e-commerce platform, putting thousands of online…

CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks
23
Oct
2025

CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks

CISA has issued a critical alert regarding a severe vulnerability in Motex LANSCOPE Endpoint Manager, a popular tool for managing…

Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process
23
Oct
2025

Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process

Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software Data Center and Server that enables authenticated attackers to…

DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users
23
Oct
2025

DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users

The Department of Homeland Security (DHS) has issued the first known federal search warrant compelling OpenAI to disclose user data…

Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks
23
Oct
2025

Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks

The popular Impacket toolkit, a staple in penetration testing and now integrated into the Kali Linux repository, is set for…