• Menu
  • Skip to main content

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cyber Security News

First and the last stop to get the latest cyber security news.

three pcie encryption weaknesses expose pcie 5.0+ systems to faulty

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The flaws impact PCIe Base Specification Revision…

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data HandlingRead More

warning: winrar vulnerability cve 2025 6218 under active attack by multiple threat

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability,…

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat GroupsRead More

webinar: how attackers exploit cloud misconfigurations across aws, ai models,

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look…

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and KubernetesRead More

microsoft issues security fixes for 56 flaws, including active exploit

Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days

Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the 56 flaws, three are rated Critical,…

Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-DaysRead More

fortinet, ivanti, and sap issue urgent patches for authentication and

Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws

Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager…

Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution FlawsRead More

north korea linked actors exploit react2shell to deploy new etherrat malware

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT.…

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT MalwareRead More

four threat clusters using castleloader as graybravo expands its malware

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment …

storm 0249 escalates ransomware attacks with clickfix, fileless powershell, and dll

Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like …

how to streamline zero trust using the shared signals framework

How to Streamline Zero Trust Using the Shared Signals Framework

Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their …

google adds layered defenses to chrome to block indirect prompt

Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats

Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI) …

stac6565 targets canada in 80% of attacks as gold blade

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as …

researchers find malicious vs code, go, npm, and rust packages

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect …

experts confirm js#smuggler uses compromised sites to deploy netsupport rat

Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT

Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a …

⚡ weekly recap: usb malware, react2shell, whatsapp worms, ai ide

⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake apps …

Get the latest news

Subscribe now and get the latest cyber security news in your email.

Copyright © TheCyberSecurity.News, All Rights Reserved.