The Democratic People’s Republic of Korea (DPRK) has intensified its global cyber operations, systematically violating United Nations Security Council resolutions through large-scale cyberattacks, cryptocurrency theft, and cross-border money laundering schemes. According to the Multilateral Sanctions Monitoring Team (MSMT) report, North…
Category: Cyber Security News
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks
A new research study from Anthropic has uncovered a concerning pattern in large language models: when these AI systems are trained to pursue specific goals, they can develop reward hacking behaviors that lead to malicious actions in other scenarios. The…
Microsoft Security Keys May Require PIN After Recent Windows Updates
Microsoft has confirmed that FIDO2 security keys on Windows 11 may now prompt users to set up a PIN during authentication following specific recent updates, aligning with WebAuthn standards for enhanced user verification. The change began with the September 29,…
11 Best Enterprise Remote Access Software – 2025
In today’s hyper-connected business landscape, enterprise remote access software is no longer a luxury it’s a necessity. Organizations are embracing hybrid and remote work models, requiring secure, scalable, and efficient solutions to connect teams, manage IT assets, and protect sensitive…
Water Gamayun APT Hackers Exploit MSC EvilTwin Vulnerability to Inject Malicious Code
Water Gamayun, a persistent threat group, has recently intensified its efforts by exploiting a newly identified MSC EvilTwin vulnerability (CVE-2025-26633) in Windows systems. This malware campaign is marked by its use of multi-stage attacks targeting enterprise and government organizations, aiming…
New “JackFix” Attack Leverages Windows Updates into Executing Malicious Commands
A sophisticated ClickFix campaign dubbed “JackFix” that uses fake adult websites to hijack screens with realistic Windows Update prompts, tricking users into running multistage malware payloads. Attackers mimic popular adult sites like xHamster clones to lure victims, likely via malvertising…
Akira Ransomware Uses SonicWall VPN Exploit to Exfiltrate Sensitive Data
The Akira ransomware group has begun weaponizing vulnerabilities in SonicWall SSL VPN devices, turning merger-and-acquisition (M&A) processes into high-speed launchpads for cyberattacks. This trend exposes dangerous blind spots for businesses acquiring smaller companies, as inherited SonicWall devices often serve as…
FBI Warns of Fake Internet Crime Complaint Center (IC3) Website Used for Phishing Attacks
The Federal Bureau of Investigation (FBI) has issued urgent warnings about cybercriminals spoofing the official Internet Crime Complaint Center (IC3) website to conduct phishing attacks and steal sensitive personal information. These fake sites mimic the legitimate www.ic3.gov portal with near-perfect…
Malicious Prettier Extension on VSCode Marketplace Delivers Anivia Stealer Malware to Exfiltrate Login Credentials
A dangerous malware campaign has targeted thousands of developers through a fake extension on the Visual Studio Code Marketplace. On November 21, 2025, security researchers discovered a malicious extension named “prettier-vscode-plus” designed to trick developers into installing it by mimicking…
Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats
Building analyst expertise is a race against time that many Security Operations Centers (SOCs) are losing. New hires often require over six months to handle complex incidents with confidence, creating a bottleneck where senior analysts must compensate for the skills…
Indirect-Shellcode-Executor Tool Exploits Windows API Vulnerability to Evade AV and EDR
A new offensive security tool developed in Rust is demonstrating a novel method for bypassing modern Endpoint Detection and Response (EDR) systems by exploiting an overlooked behavior in the Windows API. Dubbed Indirect-Shellcode-Executor, the tool leverages the ReadProcessMemory function to…
Hackers Sell Lifetime Access to WormGPT and KawaiiGPT for Just $220
Cybercriminals are now selling lifetime access to malicious AI chatbots WormGPT and KawaiiGPT for as little as $220, marking a dangerous new chapter in AI-powered cybercrime. These tools remove all ethical restrictions found in mainstream AI models, enabling attackers to…
Hackers Exploit NTLM Authentication Flaws to Target Windows Systems
More than two decades after its initial discovery, the NTLM authentication protocol continues to plague Windows systems worldwide. What started in 2001 as a theoretical vulnerability has evolved into a widespread security crisis, with attackers actively weaponizing multiple NTLM flaws…
Developers Expose Passwords and API Keys via Online Tools like JSONFormatter
Developers are unintentionally exposing passwords, API keys, and sensitive data in production information into online formatting tools such as JSONFormatter and CodeBeautify. New research from watchTowr shows that thousands of secrets from critical organizations have been publicly accessible for years…
Microsoft Details Security Risks of New Agentic AI Feature
In recent weeks, discussions have centered on Microsoft’s experimental agentic AI feature, which has introduced both advanced task automation and significant security concerns. This agentic capability, available to Windows insiders as part of Copilot Labs, is designed to allow digital…
HashJack: New Attack Technique Tricks AI Browsers Using a Simple ‘#’
Security researchers at Cato CTRL have discovered a new indirect prompt injection technique called HashJack, which weaponises legitimate websites to manipulate AI browser assistants. The attack conceals malicious instructions after the “#” symbol within trusted URLs, enabling threat actors to conduct…
Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks
The Tor Project has announced a significant cryptographic overhaul, retiring its legacy relay encryption algorithm after decades of service and replacing it with Counter Galois Onion (CGO). This research-backed encryption design defends against a broader class of sophisticated online attackers.…
Microsoft Teams Introduces New Feature to Boost Performance and Startup Speed
Microsoft has announced a significant update to the Teams Desktop Client for Windows that aims to enhance performance and reduce startup times for calling features. The update, detailed in the Message Center notification MC1189656 published on November 25, 2025, introduces…
ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access
ASUS has disclosed a high security vulnerability in its MyASUS application that could allow local attackers to escalate their privileges to SYSTEM-level access on affected Windows devices. The flaw, tracked as CVE-2025-59373, carries a high-severity CVSS 4.0 score of 8.5,…
Apache Syncope Vulnerability Allows Attacker to Access Internal Database Content
A significant issue has been disclosed that affects multiple versions of the identity and access management platform. The flaw stems from a hardcoded default encryption key used for password storage, allowing attackers with database access to recover plaintext passwords. The…