Home Cyber News

Cyber News

Explore the cutting edge of cybersecurity with our Cyber News category. We cover breaking updates on cyber threats, data breaches, ransomware attacks, and the latest tech innovations in security.

Our expert-driven content provides in-depth analyses of incidents, trends, and solutions to help individuals and businesses stay protected in an ever-evolving digital landscape.

From global hacking campaigns to critical vulnerabilities, we ensure you never miss the important stories shaping the world of cybersecurity. Subscribe to our Cyber News Alerts for real-time updates and weekly recaps. Stay informed, secure, and one step ahead of cyber threats.

Operation Destabilise, Authorities Dismateled Cybercriminals Money Laundering Network

Operation Destabilise, Authorities Dismateled Cybercriminals Money Laundering Network

In a major international operation codenamed "Operation Destabilise," law enforcement agencies have successfully dismantled sophisticated Russian money laundering networks that served cybercriminals, drug traffickers, and sanctioned Russian elites worldwide. The operation, led by the National...
WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team. The...
TAG-110 Attacking Users With HATVIBE And CHERRYSPY Hacking Tools

Russian TAG-110 Attacking Users With HATVIBE And CHERRYSPY Hacking Tools

TAG-110, a threat group affiliated with Russia, is conducting an ongoing cyber-espionage effort targeting Central Asia, East Asia, and European organizations. The group mainly targets government agencies, human rights organizations, and educational institutions with custom...
Hackers Abuse Avast Anti-Rootkit driver To Evade Detection

Hackers Abuse Avast Anti-Rootkit Driver To Evade Detection

A malicious campaign has been discovered in which the malware employs a more nefarious tactic, dropping the legitimate Avast Anti-Rootkit driver (aswArPot.sys) to evade detection. The malware takes advantage of the driver's deep access to...
Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks

Interpol Arrested 1,000+ Cybercriminals and Dismantled 130,000+ Malicious Networks

A joint operation by INTERPOL and AFRIPOL has led to the arrest of 1,006 suspects and the dismantling of 134,089 malicious infrastructures across 19 African countries. The operation, codenamed Operation Serengeti, targeted cybercriminals involved...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments. The study, conducted by Haitham S. Al-Sinani from the...
T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile Spotted Chinese Salt Typhoon Hackers Attacking Its Routers

T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network. This announcement follows reports from earlier this month about Salt Typhoon's successful breaches of wiretap systems managed...
Windows 11 Integer Overflow Vulnerability

New Windows 11 Integer Overflow Vulnerability Lets Attackers Elevate Privileges

A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer overflow vulnerability. The exploit, which affects the ksthunk.sys driver was successfully demonstrated at the recent...
Active Directory Certificate Services Vulnerability

Active Directory Certificate Services Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in Microsoft's Active Directory Certificate Services (AD CS) that could allow attackers to escalate privileges and potentially gain domain admin access. This new exploit, dubbed ESC15 or "EKUwu," was discovered by...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...