Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware

Cybersecurity investigators have identified a new cyberattack campaign connected to the Russia-linked hacking group APT28, also known as UAC-0001. The campaign, named Operation Neusploit, uses a recently discovered Microsoft Office vulnerability called CVE-2026-21509. Security researchers from Zscaler ThreatLabz revealed that the attackers began exploiting the weakness just days after Microsoft publicly disclosed it. The attacks…

Read More

Google Uncovered Significant Expansion in ShinyHunters Threat Landscape

The ShinyHunters threat group has expanded its extortion operations with sophisticated attack methods targeting cloud-based systems across multiple organizations. These cybercriminals use voice phishing and fake harvesting credential websites to steal login information from employees. Once they gain access, they extract sensitive data from cloud software applications and use this information to demand ransom payments from…

Read More

Open-source AI models can be exploited for criminal activities: Study

A new study shows that open-source AI chatbots, like Meta’s Llama and Google DeepMind’s Gemma, are being used in ways researchers didn’t expect—including by hackers. After tracking thousands of servers running these models worldwide over 293 days, experts found thousands of deployments with security issues, noting hundreds of instances where guardrails had been removed and…

Read More

RondoDox botnet linked to large-scale exploit of critical HPE OneView bug

A critical HPE OneView flaw is now being exploited at scale, with Check Point tying mass, automated attacks to the RondoDox botnet. The security outfit says it has identified “large-scale exploitation” of CVE-2025-37164, a maximum-severity remote code execution bug in HPE’s data center management platform. Check Point has tied the activity to RondoDox, a Linux-based…

Read More

Noida International Airport partners with Tech Mahindra for network and cyber security Read more At: https://www.aninews.in/news/business/noida-international-airport-partners-with-tech-mahindra-for-network-and-cyber-security

The partnership will see Tech Mahindra deploy a 24/7 Network and Security Operations Centre to safeguard NIA’s critical IT infrastructure, ensuring operational continuity, proactive threat detection, and robust cybersecurity across airport systems. Tech Mahindra has secured a strategic project from Noida International Airport (NIA) to design, implement, and operate an integrated Network and Security Operations Centre…

Read More

Cisco boosts phase-out of insecure legacy with new initiative

Cisco is phasing out insecure legacy features and hardening device configurations as part of a new resilient infrastructure initiative. The effort is a direct response to threats from AI-powered attacks ansecurity, Secure by default, AI Attack, d prepares networks for post-quantum cryptography. In the process, it is making secure-by-default the baseline. Organizations face escalating risks…

Read More

Nantha Ram Ramalingam, Appointed Director & Head of Cybersecurity GCC at Albertsons India

Albertsons Companies, a leading food and drug retailer in the United States, has appointed Nantha Ram Ramalingam as Director and Head of Cybersecurity GCC (India) of Albertsons Companies India, located in Bengaluru. Nantha Ram has over 16 years of experience in Information & Cyber Security, Industrial Cybersecurity (OT Security), Retail Security, Supply Chain Security, and…

Read More

Saepio Acquires Ruptura to strengthen Cybersecurity capabilities

Saepio has acquired Ruptura to help organisations safeguard their most critical systems and data in an increasingly complex threat environment. Having previously collaborated through a successful partnership, Saepio and Ruptura already share a proven track record of delivering robust cyber defences for clients. The acquisition brings Ruptura’s advanced penetration testing (pen testing) skills directly in-house,…

Read More

Govt enforces regulations for telecom, Cyber security

The government has brought all digital services that use mobile numbers — from WhatsApp and payment apps to food delivery platforms — under telecom cybersecurity regulations, empowering authorities to order immediate suspension of user accounts across multiple services simultaneously.   The Telecommunications (Telecom Cyber Security) Amendment Rules, 2025, notified on October 22 and effective immediately,…

Read More

True Launches Cybersecurity & Defense Tech Practice to Meet Evolving Global Defense Tech Talent Demands

True, the only tech and data-first global executive talent platform, today announced the launch of its Cybersecurity & Defense Tech Practice. This move is a strategic expansion of the firm’s Cybersecurity Practice, which now includes the capability to help build winning defense companies globally. “We are always at the forefront of innovation, and nowhere is…

Read More