Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

    New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise

    October 7, 2025
    Cyber News

    For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the…

  • XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

    XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

    October 7, 2025
    Cyber News

    Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of malicious actions on compromised hosts. “XWorm’s modular design is built around a core client and an array of specialized components known as plugins,” Trellix researchers Niranjan Hegde and Sijo Jacob said in an analysis…

  • Patch Now: ‘RediShell’ Threatens Cloud Via Redis RCE

    Patch Now: ‘RediShell’ Threatens Cloud Via Redis RCE

    October 7, 2025
    Cyber News

    A 13-year-old flaw with a CVSS score of 10 in the popular data storage service allows for full host takeover, and more than 300k instances are currently exposed. ​ ​ ​Read More

  • 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely

    13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely

    October 7, 2025
    Cyber News

    Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution under certain circumstances. The vulnerability, tracked as CVE-2025-49844 (aka RediShell), has been assigned a CVSS score of 10.0. “An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger…

  • Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware

    Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware

    October 7, 2025
    Cyber News

    Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere software to facilitate the deployment of Medusa ransomware. The vulnerability is CVE-2025-10035 (CVSS score: 10.0), a critical deserialization bug that could result in command injection without authentication. It was addressed in version 7.8.4,…

  • Chinese Gov’t Fronts Trick the West to Obtain Cyber Tech

    Chinese Gov’t Fronts Trick the West to Obtain Cyber Tech

    October 6, 2025
    Cyber News

    Outwardly neutral Chinese institutions have been collaborating with Western orgs and researchers for the benefit of PRC state intelligence. ​ ​ ​Read More

  • New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

    New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

    October 6, 2025
    Cyber News

    A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the Ministry of State Security (MSS). The assessment comes from evidence that at least four BIETA personnel have clear or possible links to MSS officers and their relationship with the University of International Relations,…

  • 5 Critical Questions For Adopting an AI Security Solution

    5 Critical Questions For Adopting an AI Security Solution

    October 6, 2025
    Cyber News

    In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction to secure AI pipelines, sensitive data assets, and the overall AI ecosystem. These solutions help ​ ​…

  • ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

    ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

    October 6, 2025
    Cyber News

    The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really matters—key trends, warning signs, and stories shaping today’s security landscape. Whether you’re defending systems or just keeping up, these…

  • CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

    CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

    October 4, 2025
    Cyber News

    Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked,…

Previous Page
1 … 10 11 12 13 14 … 28
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn