Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

  • Home
  • Toolkit
  • About
  • Services
  • Cybersecurity News
  • Contact
  • Facebook
  • X
  • LinkedIn
  • Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

    Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

    November 4, 2025
    Cyber News

    Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. The vulnerabilities “allowed attackers to manipulate conversations, impersonate colleagues, and exploit notifications,” Check Point said in a report shared with The Hacker News. Following responsible disclosure in March ​ ​ ​Read…

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

    Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

    November 3, 2025
    Cyber News

    Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John Tuckner, the extension in question, juan-bianco.solidity-vlang (version 0.0.7), was first published on October 31, 2025, as a completely benign library that was subsequently updated to version 0.0.8 on November…

  • Let’s Get Physical: A New Convergence for Electrical Grid Security

    Let’s Get Physical: A New Convergence for Electrical Grid Security

    November 3, 2025
    Cyber News

    The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together. ​ ​ ​Read More

  • Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

    Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

    November 3, 2025
    Cyber News

    Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately steal cargo freight. The threat cluster, believed to be active since at least June 2025 according to Proofpoint, is said to be collaborating with organized…

  • ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

    November 3, 2025
    Cyber News

    Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted…

  • AI Developed Code: 5 Critical Security Checkpoints for Human Oversight

    AI Developed Code: 5 Critical Security Checkpoints for Human Oversight

    November 3, 2025
    Cyber News

    To write secure code with LLMs developers must have the skills to use AI as a collaborative assistant rather than an autonomous tool, Madou argues. ​ ​ ​Read More

  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

    ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

    November 1, 2025
    Cyber News

    The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented implant known as BADCANDY. The activity, per the intelligence agency, involves the exploitation of CVE-2023-20198 (CVSS score: 10.0), a critical vulnerability that allows a remote, unauthenticated attacker to create…

  • UNC6384 Targets European Diplomatic Entities With Windows Exploit

    UNC6384 Targets European Diplomatic Entities With Windows Exploit

    October 31, 2025
    Cyber News

    The spear-phishing campaign uses fake European Commission and NATO-themed lures to trick diplomatic personnel into clicking malicious links. ​ ​ ​Read More

  • Ribbon Communications Breach Marks Latest Telecom Attack

    Ribbon Communications Breach Marks Latest Telecom Attack

    October 31, 2025
    Cyber News

    The US telecom company disclosed that suspected nation-state actors first gained access to its network in December of last year, though it’s unclear if attackers obtained sensitive data. ​ ​ ​Read More

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically

    OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically

    October 31, 2025
    Cyber News

    OpenAI has announced the launch of an “agentic security researcher” that’s powered by its GPT-5 large language model (LLM) and is programmed to emulate a human expert capable of scanning, understanding, and patching code. Called Aardvark, the artificial intelligence (AI) company said the autonomous agent is designed to help developers and security teams flag and…

Previous Page
1 … 16 17 18 19 20 … 45
Next Page
Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Secure Cyber Labs | Cybersecurity Resources by DrewNet Cybersecurity

Privacy Policy

  • Facebook
  • X
  • LinkedIn