Category: CyberSecurityNews

Weaponized NuGet Packages Inject Time-Delayed Destructive Payloads to Attack ICS Systems
11
Nov
2025

Weaponized NuGet Packages Inject Time-Delayed Destructive Payloads to Attack ICS Systems

A sophisticated supply chain attack has emerged, targeting industrial control systems through compromised .NET packages. The threat landscape shifted on…

Best MSP Software: The Essential Tech Stack 
11
Nov
2025

Best MSP Software: The Essential Tech Stack 

To grow a successful MSP business, you need the right technology stack, but the real question is: how do you…

Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk
11
Nov
2025

Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk

Ivanti has rolled out security updates for its Endpoint Manager product, addressing three high-severity vulnerabilities that could let authenticated local…

Firefox Releases Security Update to Fix Multiple Vulnerabilities Allowing Arbitrary Code Execution
11
Nov
2025

Firefox Releases Security Update to Fix Multiple Vulnerabilities Allowing Arbitrary Code Execution

Mozilla has rolled out Firefox 145, addressing a series of high-severity vulnerabilities that could allow attackers to execute arbitrary code…

Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares
11
Nov
2025

Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares

Security researchers from CyberProof have discovered significant connections between two advanced banking trojans targeting Brazilian users and financial institutions. The…

New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems
11
Nov
2025

New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems

VanHelsing has emerged as a sophisticated ransomware-as-a-service operation that fundamentally changes the threat landscape for organizations worldwide. First observed on…

Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub
11
Nov
2025

Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub

A sophisticated remote data-wipe attack targeting Android devices has emerged, exploiting Google’s Find Hub service to execute destructive operations on…

Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code
11
Nov
2025

Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code

Synology has released an urgent security update addressing a critical remote code execution vulnerability in BeeStation OS that allows unauthenticated…

Zoom Workplace for Windows Vulnerability Allow Users to Escalate Privilege
11
Nov
2025

Zoom Workplace for Windows Vulnerability Allow Users to Escalate Privilege

A security vulnerability has been discovered in Zoom Workplace VDI Client for Windows that could allow attackers to gain elevated…

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access
11
Nov
2025

WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

A critical vulnerability in WatchGuard Firebox firewalls could allow attackers to gain complete administrative access to the devices without any…

65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub
11
Nov
2025

65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub

A new security investigation reveals that 65% of prominent AI companies have leaked verified secrets on GitHub, exposing API keys,…

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
11
Nov
2025

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Email-based threats have reached a critical inflection point in the third quarter of 2025. Threat actors are systematically exploiting weaknesses…