Thursday, October 30, 2025
Follow on LinkedIn

Cyber News

Explore the cutting edge of cybersecurity with our Cyber News category. We cover breaking updates on cyber threats, data breaches, ransomware attacks, and the latest tech innovations in security.

Our expert-driven content provides in-depth analyses of incidents, trends, and solutions to help individuals and businesses stay protected in an ever-evolving digital landscape.

From global hacking campaigns to critical vulnerabilities, we ensure you never miss the important stories shaping the world of cybersecurity. Subscribe to our Cyber News Alerts for real-time updates and weekly recaps. Stay informed, secure, and one step ahead of cyber threats.

Windows Remote Desktop Gateway Vulnerability Exposes Systems to DoS Attacks

Microsoft has disclosed a significant vulnerability in its Windows Remote Desktop Gateway (RD Gateway) that could allow attackers to exploit a race condition, resulting...

OneBlood Confirms Ransomware Attack – Donor’s Personal Information Stolen

OneBlood, a major blood donation nonprofit serving the southeastern United States, has confirmed a significant data breach resulting from a ransomware attack that occurred...

Researchers Detailed ZAP Scanner’s Capabilities in Identifying Security Flaws

Researchers have conducted a detailed study on the capabilities of ZAP (Zed Attack Proxy), an open-source tool widely used for identifying vulnerabilities in web...

Hackers Exploiting YouTube to Deliver Malware Bypassing Antivirus Detections

Cybercriminals are increasingly leveraging YouTube's vast platform to distribute malware, bypassing traditional antivirus detections and exploiting users' trust in the popular video-sharing site. Security researchers...

100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect

Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis revealed that the malware...
IBM watsonx.ai Vulnerability

IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI

IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to cross-site scripting (XSS) attacks. The vulnerability, identified as CVE-2024-49785, affects both...
Researchers Hacked into Apple’s New USB-C Controller

Researchers Hacked into Apple’s New USB-C Controller

Security researchers have successfully hacked Apple's proprietary ACE3 USB-C controller. This chip, introduced with the iPhone 15 and iPhone 15 Pro, represents a significant...
2,048 Ivanti VPN Instances Vulnerable to Exploited Zero-Day Attacks

2,048 Ivanti VPN Instances Vulnerable to Exploited Zero-Day Attacks

A critical security vulnerability in Ivanti Connect Secure VPN appliances has left 2,048 instances worldwide exposed to potential exploitation, with the United States hosting...
Weaponized LDAP PoC Exploit Installing Information-Stealing Malware

Weaponized LDAP PoC Exploit Installing Information-Stealing Malware

Security researchers are tricked into downloading and executing information-stealing malware by a fake proof-of-concept (PoC) exploit for CVE-2024-49113, dubbed LDAPNightmare. During Microsoft's monthly Patch Tuesday...
Fake CrowdStrike Job Offers Attacking Developers to Deploy Cryptominer

Fake CrowdStrike Job Offers Attacking Developers to Deploy Cryptominer

In a sophisticated phishing campaign, uncovered cybercriminals are exploiting CrowdStrike's recruitment branding to target developers and deploy the XMRig cryptominer. This deceptive operation leverages...
CSN

Top 10