Category: CyberSecurityNews

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability
02
Oct
2025

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

A proof-of-concept (PoC) exploit has been released for a critical vulnerability chain in VMware Workstation that allows an attacker to…

New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime
02
Oct
2025

New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime

A new proof-of-concept (PoC) tool named Obex has been released, offering a method to prevent Endpoint Detection and Response (EDR)…

Red Hat Data Breach - Threat Actors Claim Breach of 28K Private GitHub Repositories
02
Oct
2025

Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories

An extortion group known as the Crimson Collective claims to have breached Red Hat’s private GitHub repositories, making off with…

Chrome Security Update - Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser
02
Oct
2025

Chrome Security Update – Patch for 21 Vulnerabilities that Allows Attackers to Crash Browser

Google has released Chrome 141 to address 21 security vulnerabilities, including critical flaws that could allow attackers to crash browsers…

Microsoft Outlook for Windows Bug Leads to Crash While Opening Email
02
Oct
2025

Microsoft Outlook for Windows Bug Leads to Crash While Opening Email

Microsoft has confirmed it is investigating a significant bug in the classic Outlook for Windows desktop client that causes the…

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code
02
Oct
2025

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code

Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers…

Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040
02
Oct
2025

Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040

Google has published a comprehensive guide aimed at fortifying organizational defenses against UNC6040, a sophisticated threat actor known for targeting…

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms
02
Oct
2025

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms

A sophisticated malicious package has infiltrated the Python Package Index (PyPI), masquerading as a legitimate SOCKS5 proxy tool while harboring…

01
Oct
2025

Ukraine Warns of Weaponized XLL Files Delivers CABINETRAT Malware Via Zip Files

Ukrainian security agencies have issued an urgent warning regarding a sophisticated malware campaign targeting government and critical infrastructure sectors through…

Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware
01
Oct
2025

Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware

Cybersecurity researchers have uncovered a sophisticated Android malware campaign targeting seniors through fraudulent travel and social activity promotions on Facebook….

AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses
01
Oct
2025

AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses

A new ransomware strain, dubbed FunkLocker, is leveraging artificial intelligence to expedite its development, while relying on the abuse of…

Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware
01
Oct
2025

Hackers Abuse EV Certificates to Sign Completely Undetectable DMG Malware

In recent weeks, security analysts have observed a new wave of macOS attacks leveraging legitimately issued Extended Validation (EV) certificates…