• Menu
  • Skip to main content

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cyber Security News

First and the last stop to get the latest cyber security news.

hackers use github repositories to host amadey malware and data

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as part of a campaign observed in April 2025. “The MaaS [malware-as-a-service] operators used fake GitHub accounts to host payloads,…

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing FiltersRead More

hackers exploit apache http server flaw to deploy linuxsys cryptocurrency

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server to deliver a cryptocurrency miner called Linuxsys. The vulnerability in question is CVE-2021-41773 (CVSS score: 7.5), a high-severity path…

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency MinerRead More

europol disrupts noname057(16) hacktivist group linked to ddos attacks against

Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine

An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as NoName057(16) that has been linked to a string of distributed denial-of-service (DDoS) attacks against Ukraine and its allies. The…

Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against UkraineRead More

ctem vs asm vs vulnerability management: what security leaders need

CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025

The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that are purely passive and reactive, and in most cases, ineffective against emerging threats and sophisticated threat actors. Prioritizing cybersecurity…

CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025Read More

chinese hackers target taiwan's semiconductor sector with cobalt strike, custom

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat actors. “Targets of these campaigns ranged from organizations involved in the manufacturing, design, and testing of semiconductors and integrated…

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom BackdoorsRead More

cisco warns of critical ise flaw allowing unauthenticated attackers to

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could permit an attacker to execute arbitrary code on the underlying operating system with elevated…

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root CodeRead More

hackers leverage microsoft teams to spread matanbuchus 3.0 malware to

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in significant features to enhance its …

unc6148 backdoors fully patched sonicwall sma 100 series devices with overstep

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances as part of …

critical golden dmsa attack in windows server 2025 enables cross domain

Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access

Cybersecurity researchers have disclosed what they say is a "critical design flaw" in delegated Managed Service Accounts (dMSAs) introduced in Windows …

ai agents act like employees with root access—here's how to

AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

The AI gold rush is on. But without identity-first security, every deployment becomes an open door. Most organizations secure native AI like a web …

new konfety malware variant evades detection by manipulating apks and

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the evil twin …

deepfakes. fake recruiters. cloned cfos — learn how to stop

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

Social engineering attacks have entered a new era—and they're coming fast, smart, and deeply personalized. It's no longer just suspicious emails in …

urgent: google releases critical chrome update for cve 2025 6558 exploit active

Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one that it said has been exploited in the wild. The …

google ai "big sleep" stops exploitation of critical sqlite vulnerability

Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw in the SQLite …

Get the latest news

Subscribe now and get the latest cyber security news in your email.

Copyright © TheCyberSecurity.News, All Rights Reserved.