ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen
25
Nov
2025

ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen

A new wave of ClickFix attacks is abusing highly realistic fake Windows Update screens and PNG image steganography to secretly…

New self-propagating SSC worm hits GitHub
25
Nov
2025

New self-propagating SSC worm hits GitHub

JFrog’s Security Research team has identified a major escalation in the ongoing “Shai-Hulud” software supply chain attack, uncovering a new…

NVIDIA Isaac-GROOT Flaws Let Attackers Inject Malicious Code
25
Nov
2025

NVIDIA Isaac-GROOT Flaws Let Attackers Inject Malicious Code

NVIDIA has released security updates addressing two critical code injection vulnerabilities in its Isaac-GR00T robotics software platform. The flaws could…

NVIDIA’s Isaac-GROOT Robotics Platform Vulnerability Let Attackers Inject Malicious Codes
25
Nov
2025

NVIDIA’s Isaac-GROOT Robotics Platform Vulnerability Let Attackers Inject Malicious Codes

NVIDIA has disclosed two critical code injection vulnerabilities affecting its Isaac-GR00T robotics platform. The vulnerabilities, tracked as CVE-2025-33183 and CVE-2025-33184,…

APT35 Data Leak Uncovers the Iranian Hacker Group’s Operations and Tactics
25
Nov
2025

APT35 Data Leak Uncovers the Iranian Hacker Group’s Operations and Tactics

In October 2025, a significant breach exposed internal operational documents from APT35, also known as Charming Kitten, revealing that the…

Elephant Group Launches Defense Sector Attacks Using MSBuild-Delivered Python Backdoor
25
Nov
2025

Elephant Group Launches Defense Sector Attacks Using MSBuild-Delivered Python Backdoor

An India-aligned advanced persistent threat group known as Dropping Elephant has launched sophisticated cyberattacks against Pakistan’s defense sector using a…

Attackers Swap ‘m’ with ‘rn’ in Microsoft.com to Trick Users
25
Nov
2025

Attackers Swap ‘m’ with ‘rn’ in Microsoft.com to Trick Users

A sophisticated phishing campaign is currently exploiting a subtle typographical illusion to deceive users into surrendering sensitive login credentials. Cybercriminals…

Hackers Leveraging WhatsApp to Silently Harvest Logs and Contact Details
25
Nov
2025

Hackers Leveraging WhatsApp to Silently Harvest Logs and Contact Details

Security researchers at K7 Labs have uncovered a sophisticated phishing campaign targeting Brazilian users that exploits WhatsApp Web to distribute…

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
25
Nov
2025

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention

Tel Aviv, Israel, November 24th, 2025, CyberNewsWire Blast is introducing a new operating model for cloud security with a first-of-its-kind…

25
Nov
2025

Delivering Compliance, Continuity and Cost Efficiency with Windows 365 and Nerdio

For cubesys, the answer lies in Windows 365 and Nerdio: both technologies that combine cloud security, automation, and AI to…

Matt Kapko
25
Nov
2025

Shai-Hulud worm returns stronger and more automated than ever before

Security researchers and authorities are warning about a fresh wave of supply-chain attacks linked to a self-replicating worm that attackers…

25
Nov
2025

Collaboration is Key in the Age of AI

“This is as big as the internet revolution,” he said. “And this is not something that a group of engineers…