Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser
21
Nov
2025

Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser

A new command-and-control platform called Matrix Push C2 has emerged as a serious threat to web users across all operating…

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads
21
Nov
2025

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads

Cybersecurity researchers have identified a sophisticated malware campaign leveraging artificial intelligence to enhance obfuscation techniques, enabling malicious applications to circumvent…

sturnus-android-malware-whatsapp-telegram-signal-chats
21
Nov
2025

New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse

Cybersecurity researchers have discovered a new, highly dangerous Android banking malware called Sturnus, named after the common starling or ‘songbird’…

CrowdStrike
21
Nov
2025

CrowdStrike catches insider feeding information to hackers

American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with unnamed threat actors. However,…

Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware
21
Nov
2025

Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware

Chinese-backed attackers have begun weaponizing a critical vulnerability in Microsoft Windows Server Update Services (WSUS) to distribute ShadowPad, a sophisticated…

Advanced Features Bypass AI Detection and Steal Password Manager Data
21
Nov
2025

Advanced Features Bypass AI Detection and Steal Password Manager Data

The Python-based information-stealing tool Xillen Stealer has reached versions 4 and 5, significantly expanding its targeting capabilities and functionality across…

Android Malware Records Encrypted Messages, Hijacks Devices
21
Nov
2025

Android Malware Records Encrypted Messages, Hijacks Devices

Security researchers have identified a new Android banking trojan that does much more than steal banking credentials. It can also…

Hong Kong launches probe after voters’ personal details posted on social media
21
Nov
2025

Hong Kong launches probe after voters’ personal details posted on social media

Hong Kong authorities have launched an investigation after the personal details of “some voters were uploaded to a social media…

FCC rolls back cybersecurity rules for telcos, despite state-hacking risks
21
Nov
2025

FCC rolls back cybersecurity rules for telcos, despite state-hacking risks

The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to implement stricter cybersecurity…

Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads
21
Nov
2025

Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads

Retailers are facing a sharp rise in targeted ransomware activity as the holiday shopping season begins. Threat groups are timing…

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges
21
Nov
2025

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges

Microsoft disclosed a critical authentication bypass vulnerability in Azure Bastion, its managed remote access service, enabling attackers to escalate privileges…

ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms
21
Nov
2025

ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms

Salesforce, a renowned customer relationship management (CRM) platform, has confirmed it is dealing with a significant security incident. The company…