💻 𝗠𝗮𝘀𝘁𝗲𝗿 𝗶𝗻 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆! 150+ Advanced Cybersecurity Courses Online with Lifetime Access -> https://lnkd.in/gpvdaCSX $150 𝗛𝗮𝗹𝗹𝗼𝘄𝗲𝗲𝗻 𝗦𝗽𝗲𝗰𝗶𝗮𝗹 Discount Code: HALLOWEEN25 Final Extended Last 12 Hours 𝗛𝗮𝗹𝗹𝗼𝘄𝗲𝗲𝗻 Offer! Ethical Hackers Academy® delivers 100+ premium cybersecurity courses with labs for anyone looking to transition their careers into cybersecurity. Join Diamond Membership 360,000+ students from 150+ countries to get a lifetime learning experience. 𝐖𝐡𝐲 𝐃𝐢𝐚𝐦𝐨𝐧𝐝 𝐌𝐞𝐦𝐛𝐞𝐫𝐬𝐡𝐢𝐩 𝐟𝐫𝐨𝐦 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬 𝐀𝐜𝐚𝐝𝐞𝐦𝐲? The Diamond Membership offers continual learning opportunities to enhance your skills and prepare the way for you to become an esteemed expert in many prominent cybersecurity fields, as outlined below: Penetration Testing, VAPT, Security Auditing, Ethical Hacking, Malware analysis, bug bounty, Exploit Development, Kali Linux Training, Android Hacking, Vulnerability assessment, network Hacking, GDPR, Python Programming, Threat Analysis, Reverse Engineering, Cyber Forensics, IoT Security, SOC Operations Training, Web Hacking, 100+ Hacking Tools, and more. 𝐋𝐢𝐟𝐞 𝐓𝐢𝐦𝐞 𝐃𝐢𝐚𝐦𝐨𝐧𝐝 𝐌𝐞𝐦𝐛𝐞𝐫𝐬𝐡𝐢𝐩 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 𝐓𝐡𝐚𝐭 𝐂𝐨𝐯𝐞𝐫𝐬: ✅ Penetration Testing ✅ Vulnerability Assessment ✅ Security Auditing ✅ Ethical Hacking ✅ Malware Analysis ✅ Bug Bounty ✅ Exploit Development ✅ Kali Linux Training ✅ Android Hacking ✅ Network Hacking ✅ GDPR ✅ Python Programming ✅ Threat Analysis ✅ Reverse Engineering ✅ Cyber Forensics ✅ IoT Security ✅ SOC operations training ✅ Web hacking ✅ Digital Forensics ✅ CompTIA ✅ CISSP ✅ AWS Security ✅ Docker Security ✅ Kubernetes Security ✅ Data Protection & Compliance ✅ Incident Response ✅ Cloud Penetration Testing ✅ Learn 100+ Hacking tools and more. 𝐊𝐞𝐲 𝐇𝐢𝐠𝐡𝐥𝐢𝐠𝐡𝐭𝐬 ✅ 100+ Curated Courses and E-Degrees ✅ 3000+ hours of Training videos ✅ 20+ New Courses Added Every Year ✅ 1 E-Degree Added Every Year ✅ 24/7 Unlimited Access ✅ Lifetime Subscription ✅ Lifetime Technical Support and Update ✅ Interactive Learning Modules ✅ Certifications with CPE Credits ✅ Complete Practical Training ✅ Practical labs and Setup Guide ✅ 500+ Downloadable E-Book, materials 100+ 𝐂𝐨𝐮𝐫𝐬𝐞𝐬 𝐋𝐢𝐧𝐤𝐞𝐝 𝐖𝐢𝐭𝐡 𝐅𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐉𝐨𝐛 𝐑𝐨𝐥𝐞𝐬 ✅ Network Penetration tester ✅ Web Penetration Tester ✅ Malware Analyst ✅Network Security Professionals ✅Network Admins ✅Security System Administrators ✅Vulnerability tester ✅Security researcher ✅Red Team member ✅Blue Team Member ✅SOC Analyst. ✅Security Auditor. ✅Security Engineer. ✅Security analyst (II) ✅Vulnerability assessment analyst ✅Network security operations ✅Application security vulnerability ✅Ethical hacker, Cyber Security Analyst ✅Security Manager.
Cyber Security News ®
Security and Investigations
Tecci Park, Tamil Nadu 1,248,843 followers
#1 World's Most Followed Cyber Security News Platform
About us
Cyber Security News Is An Independent & Dedicated News Channel For Hackers And Security Professionals For Latest Hacker News, Cyber Crime, Cybersecurity Incidents, Security Breaches, Vulnerability, Malware, And More Breaking News Updates From Cyber Space. For Submission Enquiry: admin@cybersecuritynews.com
- Website
-
https://www.cybersecuritynews.com
External link for Cyber Security News ®
- Industry
- Security and Investigations
- Company size
- 2-10 employees
- Headquarters
- Tecci Park, Tamil Nadu
- Type
- Privately Held
- Founded
- 2018
Locations
-
Primary
Get directions
OMR Road
Tecci Park, Tamil Nadu, IN
-
Get directions
Chennai, Tamil Nadu 600077, IN
Employees at Cyber Security News ®
Updates
-
⚠️ Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data | Read more: https://lnkd.in/gwGKfZn6 Hackers can exploit Anthropic's Claude AI to steal sensitive user data. By leveraging the model's newly added network capabilities in its Code Interpreter tool, attackers can use indirect prompt injection to extract private information, such as chat histories, and upload it directly to their own accounts. The attack begins with indirect prompt injection, where an adversary embeds harmful instructions in seemingly innocuous content, like a file the user asks Claude to analyze. Leveraging Claude's recent "memory" feature, which lets the AI reference past conversations, the payload instructs the model to extract recent chat data and save it as a file in the Code Interpreter's sandbox, specifically at /mnt/user-data/outputs/hello.md. To Get Daily Security Updates, add Cyber Security News ® as your preferred source on Google -> https://lnkd.in/gtssq6QX #cybersecuritynews
-
-
SOCs using ANYRUN reduce MTTR by 21 minutes per case. Achieve the same result with your team: https://lnkd.in/g4KsgGtS
-
-
💻 Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure | Read more: https://lnkd.in/gj_SX8S9 Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one of the operating system's most essential utilities. The update, designated as KB5067036, is causing Task Manager to continue running in the background even after users close the application. This issue has been officially acknowledged by Microsoft as a known problem in the latest optional update. The KB5067036 update is part of Microsoft's routine maintenance releases designed to improve functionality, performance, and reliability across Windows 11 systems. #cybersecuritynews #windows
-
-
🛠️ New BOF Tool Exploits Microsoft Teams' Cookie Encryption to Access User Chats | Read more: https://lnkd.in/gCggSVsM A specialized Beacon Object File (BOF) is designed to extract authentication cookies from Microsoft Teams without disrupting the application. This development highlights vulnerabilities in how Teams stores sensitive access tokens, potentially enabling attackers to impersonate users. Microsoft Teams uses the msedgewebview2.exe process for authentication, storing cookies in a SQLite database, which contains access tokens for Teams, Skype, and the Microsoft Graph API. Modern Chromium browsers enhance security with a COM-based IElevator service, requiring either execution within the browser or admin access to decrypt cookie values. To Get Daily Security Updates, add Cyber Security News ® as your preferred source on Google -> https://lnkd.in/gtssq6QX #cybersecuritynews
-
-
🛡️ New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files | Read more: https://lnkd.in/gGFXvHJj An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) systems by exploiting Windows bind link technology in a novel way. The new version targets the parent directories of EDR installations, such as Program Files, to create redirection loops that blind security software without disrupting legitimate applications. EDR-Redir V2 queries all subfolders in the target parent, like Program Files, and mirrors them in a controlled directory, such as C:\TMP\TEMPDIR. It then establishes bidirectional bind links between these mirrors and originals, forming loops that maintain normal access for non-EDR software. To Get Daily Security Updates, add Cyber Security News ® as your preferred source on Google -> https://lnkd.in/gtssq6QX #cybersecuritynews
-
-
🚨 New Agent Session Smuggling Attack Let Malicious AI Agents Hijack Victim Agents | Read more: https://lnkd.in/gzzFX9m5 A sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively taking control of victim agents without user awareness or consent. This discovery highlights a critical vulnerability in multi-agent AI ecosystems that operate across organizational boundaries. #cybersecuritynews
-
-
🔐 OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically | Read more: https://lnkd.in/gJNztWVv OpenAI has unveiled Aardvark, an autonomous AI agent powered by its cutting-edge GPT-5 model, designed to detect software vulnerabilities and automatically propose fixes. This tool aims to entrust developers and security teams by scaling human-like analysis across vast codebases, addressing the escalating challenge of protecting software in an era where over 40,000 new Common Vulnerabilities and Exposures (CVEs) were reported in 2024 alone. By integrating advanced reasoning and tool usage, Aardvark shifts the balance toward defenders, enabling proactive threat mitigation without disrupting development workflows. To Get Daily Security Updates, add Cyber Security News ® as your preferred source on Google -> https://lnkd.in/gtssq6QX #cybersecuritynews
-