![Cyber Security News Profile](https://pbs.twimg.com/profile_images/1174924326807592960/aJMuU6Ms_x96.jpg)
Cyber Security News
@The_Cyber_News
Followers
13K
Following
122
Statuses
5K
Independent Cyber Security News Platform For Security Professionals to Get the Latest #HackingNews, #CyberCrime, #SecurityBreaches, #Malware & Others...
Joined August 2019
π¨8Base Ransomware Dark Web Site Seized @The_Cyber_News Read more: π΄ Ransomware Gang affected over 1,000 victims worldwide π΄ Attacks small to medium-sized businesses π΄ 8Base group employed a "double extortion" strategy #cybersecuritynews
0
0
2
@The_Cyber_News π» AnyDesk Vulnerability Exploit Allows Admin Access Through Wallpapers Read more: π Vulnerability Let Attackers Gain Admin Privilege. π Exploiting the handling ofΒ Windows background images. #cybersecurity
1
0
6
@The_Cyber_News π₯ Brute Force Attack With 2.8 Million IPs Read more: π Brute Force attack Leveraging 2.8 million IP addresses π Actively targets edge security devices π The attacks focus on edge devices critical for remote access, such as: π VPN gateways (Palo Alto Networks GlobalProtect, SonicWall NetExtender) π Firewalls (Ivanti, Fortinet) π Routers and IoT appliances. #cybersecurity
1
1
5
@The_Cyber_News β οΈ Unpatched Marvel Game RCE Exploit Full Report here: π Allows Arbitrary Code Execution. π When the Attacker is in the same wi-fi network. π Leads to Take Over of PCs & PS5s #cybersecurity #vulnerability
1
0
4
@The_Cyber_News Cybersecurity Weekly Brief: Latest on Attacks, Vulnerabilities, & Data Breaches Read more: #cybersecurity
2
1
2
π¨ IIS Servers Hacked to Deploy BadIIS Malware More Details: β οΈ 35+ IIS Servers Hacked. π BadIIS Manipulate HTTP responses π Operating in two modes π SEO Fraud Mode π Injector Mode #cybersecurity #windows #malware
2
0
1
@The_Cyber_News Trimble Cityworks RCE Vulnerability Exploited to Hack IIS Servers Read more: βͺοΈ Trimble Cityworks RCE CVE-2025-099 βͺοΈ Arbitrary code on IIS βͺοΈ Version Prioe to 15.8.9 are Vulnerable βͺοΈ updated versions of Cityworks (15.8.9 and 23.10 #cybersecurity
0
0
1
@The_Cyber_News HPE Alerts Employees of Data Breach After Russian Cyberattack More Details: βͺοΈ HPE data breach involving its Office 365 email environment βͺοΈ Hackers Gained Unauthorized access to email mailboxes βͺοΈ Exfiltrated sensitive data #cybersecurity #databreach
0
0
0
@The_Cyber_News Microsoft Edge Vulnerabilities Let Attackers Execute Remote Code | More Details: π¨ Remote Code Execution Vulnerabilities βͺοΈ CVE-2025-21342 βͺοΈ CVE-2025-21408 βͺοΈ CVE-2025-21283 βͺοΈ CVE-2025-21279 #cybersecurity #Microsoft
1
1
3
UK Order Apple to Create Backdoor for Encrypted iCloud Backups Read more: The UK government has reportedly issued a secret order to Apple, compelling the tech giant to create a backdoor for accessing encrypted iCloud backups globally. Appleβs Advanced Data Protection feature, introduced in 2022, provides end-to-end encryption for iCloud backups and other data categories, ensuring that even Apple cannot access this information. #icloud #cybersecurity
1
1
4
@The_Cyber_News DeepSeek iOS App Sending Data to ByteDance Controlled Server More Details: βͺοΈ Data Sent to China βͺοΈ Unencrypted Data Transmission βͺοΈ Weak Encryption Practices βͺοΈ Insecure Data Storage βͺοΈ Unencrypted Network Requests βͺοΈ Username, Password, and Encryption Keys Stored Insecurely #cybersecurity #DeepSeek
0
3
5
π― Splunk Unveils a New AI-Based Honeypot οΏ½οΏ½οΏ½DECEIVEβ to Log Attacker Activities More Details: Splunk, a leader in data analytics and cybersecurity solutions, has introduced a groundbreaking proof-of-concept honeypot system named DECEIVE (DECeption with Evaluative Integrated Validation Engine). This AI-powered tool is designed to simulate high-interaction systems with minimal setup effort, offering organizations an innovative way to monitor attacker behavior and gain insights into potential threats. Traditional honeypots often require extensive manual effort to set up realistic environments, including seeding them with user data, applications, and configurations. #splunk #cybersecurity
0
0
5
@The_Cyber_News OpenAI Data Breach: Threat Actor Allegedly Claims 20 Million Logins for Sale More Details: A threat actor has allegedly obtained the login information for 20 million OpenAI accounts, including passwords and email addresses. This claim was made on an underground forum, where the actor provided a sample of the data and offered the full batch for sale at a nominal price. The authenticity of these claims remains unverified, but the situation has raised significant concerns about data security in the AI industry. Terminates Contract with Italy Following Claims. #cybersecurity
0
4
10
@The_Cyber_News WhatsApp Zero-Click Paragon Spyware Terminates Contract with Italy Read more: Israeli spyware company Paragon Solutions has terminated its contract with Italy following allegations that its military-grade surveillance software, Graphite, was misused to target journalists and civil society members. The decision comes less than a week after WhatsApp revealed that the spyware had been deployed in a zero-click attack campaign targeting 90 individuals across two dozen countries, including seven in Italy. #cybersecurity
0
2
8
@The_Cyber_News DeepSeek Exposes Full System Prompt in New Jailbreak More Details: DeepSeekβs bias-based AI response logic extracts its hidden system prompt, revealing the modelβs core operational instructions, with specialized inputs that confuse the model into bypassing its security restrictions. The attack proved highly effective, requiring minimal technical expertise to execute. The crafted specialized inputs confused the model into bypassing its security restrictions. #cybersecurity #jailbreak
0
3
9
@The_Cyber_News Weaponizing Windows Background Images to Gain Admin Access Read More: The vulnerability identified by CVE-2024-12754 and tracked by ZDI-24-1711 allows local attackers to exploit the handling of Windows background images to gain unauthorized access to sensitive system files, potentially escalating their privileges to administrative levels. The vulnerability resides in AnyDesk's mechanism for handling background images during session initiation. Specifically, when a new session is initiated, AnyDesk copies the current desktop background image into the C:\Windows\Temp directory. #cybersecurity #vulnerability
0
0
6
π¨ πππ₯π°ππ«π ππππππ€π’π§π ππ¬ππ«π¬ π¨π ππ§ππ’ππ§ πππ§π€π¬ To Steal Aadhar, PAN, ATM & Credit Card PINs More Details: βͺοΈ Aadhar numbers βͺοΈ PAN cards βͺοΈ ATM PINs βͺοΈ Credit card details The malware is distributed through WhatsApp as APK files masquerading as legitimate government or banking applications. #cybersecurity #malware
0
1
8
π¨ 242,000 Times Downloaded Malicious Apps from Android & iOS Store Contains Chinese Malware Read more: The infected apps, some of which were available on Google Play and the App Store, have been downloaded over 242,000 times. The SparkCat malware uses an OCR (Optical Character Recognition) plug-in built with Googleβs ML Kit library to scan images in the deviceβs gallery for keywords related to cryptocurrency recovery phrases. #cybersecurity
0
1
6