Category: CyberSecurityNews

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
01
Nov
2025

Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach

The notorious Akira ransomware group announced on October 29, 2025, that it successfully breached the systems of Apache OpenOffice, exfiltrating…

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
01
Nov
2025

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a critical use-after-free vulnerability in the…

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
01
Nov
2025

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations

Windows Server Update Services (WSUS) vulnerability is actively exploited in the wild. Criminals are using this vulnerability to steal sensitive…

Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks
31
Oct
2025

Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Throughout the first half of 2025, financially motivated threat actors have shifted their approach to intrusions, abandoning traditional implant-heavy methods…

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data
31
Oct
2025

Beware of Malicious ChatGPT Apps That Records Users Action and Steals Sensitive Data

The explosive growth of artificial intelligence has created an unexpected security threat as cybercriminals exploit ChatGPT’s popularity through counterfeit mobile…

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
31
Oct
2025

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data

In mid-2025, researchers discovered a sophisticated campaign orchestrated by the Chinese state-sponsored threat group BRONZE BUTLER (also known as Tick)…

Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams
31
Oct
2025

Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams

Google is strengthening its defense against mobile scams with advanced AI-powered protections built directly into Android devices. As cybercriminals become…

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability
31
Oct
2025

Progress Patches MOVEit Transfer Uncontrolled Resource Consumption vulnerability

Progress Software has released critical security patches addressing a high-severity vulnerability affecting MOVEit Transfer, a widely used enterprise file transfer…

Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer
31
Oct
2025

Microsoft Introduces Researcher in Microsoft 365 Copilot, a Secure Virtual Assistant for Your Computer

Microsoft has launched Researcher with Computer Use in Microsoft 365 Copilot, marking a significant advancement in autonomous AI technology. This…

AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID
31
Oct
2025

AzureHound Penetration Testing Tool Exploited by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has become a favored weapon in…

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads
31
Oct
2025

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free and open-source Command and Control…

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
31
Oct
2025

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea’s regime have demonstrated continued technical sophistication by introducing advanced malware toolsets…