Category: CyberSecurityNews

Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework
21
Oct
2025

Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework

The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting…

How Threat Intelligence Can Save Money and Resources for Businesses
21
Oct
2025

How Threat Intelligence Can Save Money and Resources for Businesses

Cybersecurity is not just about defense; it is about protecting profits. Organizations without modern threat intelligence (TI) face escalating breach…

Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as 'NIC eEmail Services'
21
Oct
2025

Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’

A sophisticated phishing campaign orchestrated by Pakistan-linked threat actors has been discovered targeting Indian government entities by impersonating the National…

Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025
21
Oct
2025

Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025

Microsoft has acknowledged a significant authentication problem affecting users of recent Windows versions, stemming from security enhancements in updates released…

Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers
21
Oct
2025

Meta Launches New Tools to Protect Messenger and WhatsApp Users from Scammers

Meta announced innovative tools on Tuesday to shield users of Messenger and WhatsApp from scammers. The updates, revealed during Cybersecurity…

Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data
21
Oct
2025

Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data

A sophisticated vulnerability in Microsoft 365 Copilot (M365 Copilot) that allows attackers to steal sensitive tenant data, including recent emails,…

CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks
21
Oct
2025

CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert about a critical vulnerability in multiple Apple products….

Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users
21
Oct
2025

Better Auth API keys Vulnerability Let Attackers Create Privileged Credentials For Arbitrary Users

A severe vulnerability in the popular better-auth library’s API keys plugin enables attackers to generate privileged credentials for any user…

Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code
21
Oct
2025

Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code

Apache Syncope, an open-source identity management system, has been found vulnerable to remote code execution (RCE) through its Groovy scripting…

Sendmarc Appoints Dan Levinson as Customer Success Director in North America
21
Oct
2025

Sendmarc Appoints Dan Levinson as Customer Success Director in North America

Wilmington, Delaware, October 21st, 2025, CyberNewsWire Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North…

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code
21
Oct
2025

LANSCOPE Endpoint Manager Vulnerability Let Attackers Execute Remote Code

Motex has disclosed a severe remote code execution vulnerability in its LANSCOPE Endpoint Manager On-Premise Edition. Assigned CVE-2025-61932, the flaw…

New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER
21
Oct
2025

New LOSTKEYS Malware Linked to Russia State-Sponsored Hacker Group COLDRIVER

Over the summer of 2025, a novel malware family emerged following the public disclosure of the LOSTKEYS implant. This new…