-
Microsoft Exchange servers in Germany are still running without security updates, just weeks after the official end of support for key versions. The Federal Office for Information Security (BSI) issued a stark warning on October 28, 2025, revealing that 92% of approximately 33,000 known on-premise Exchange servers with internet-exposed Outlook Web Access (OWA) are running […] The post Thousands of Exchange Servers in Germany Still Running with Out-of-Support Versions appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The threat landscape continues to evolve as Gunra ransomware emerged in April 2025, establishing itself as a significant threat to organizations worldwide. This dual-platform attack group has demonstrated a systematic approach to compromising both Windows and Linux environments, making their campaign one of the more noteworthy distributed ransomware operations in recent months. Organizations across multiple […] The post Gunra Ransomware Leveraging Attacking Windows and Linux Systems with Two Encryption Methods appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical security vulnerability was discovered when a complete 4-terabyte SQL Server backup belonging to Ernst & Young (EY), one of the world’s Big Four accounting firms, was found publicly accessible on Microsoft Azure. The exposure was id…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Russian-linked attackers have intensified their targeting of Ukrainian organizations through sophisticated intrusions that rely heavily on legitimate Windows tools rather than malware. The attackers demonstrated remarkable restraint in their malware de…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In response to escalating threats of credential theft, Google, through its Mandiant cybersecurity division, has unveiled a detailed guide to help defenders monitor and secure privileged accounts across modern IT environments. This resource emphasizes practical strategies to mitigate risks posed by stolen credentials, which accounted for 16% of intrusions in 2024, according to Mandiant’s M-Trends […] The post Google Unveils Guide for Defenders to Monitor Privileged User Accounts appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has released comprehensive guidance on protecting privileged accounts, recognizing that stolen credentials have become one of the most dangerous attack vectors facing modern organizations. The new recommendations address how attackers increasing…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new remote access trojan called Atroposia has emerged as one of the most concerning threats in the cybercriminal underground, offering an unprecedented combination of stealth capabilities and attack features. This modular malware operates as a turnkey criminal toolkit designed specifically to lower the technical barrier for threat actors of varying skill levels. Priced aggressively […] The post New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The campaign leverages judicial document themes to distribute Hijackloader malware, which subsequently deploys PureHVNC remote access trojan (RAT)—marking the first observed instance where this combination has been used against Spanish-speaking users i…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Threat intelligence researchers have identified a new ransomware-as-a-service (RaaS) operation called The Gentlemen’s RaaS, being actively recruited on underground hacking forums by an operator using the handle zeta88. The cross-platform threat r…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has announced a significant security initiative that will fundamentally change how Chrome handles unsecured web connections. Beginning with Chrome 154’s release in October 2026, the browser will enable the “Always Use Secure Connections” feature by default, requiring users to approve access to any public website lacking HTTPS encryption before proceeding. This strategic shift represents […] The post Chrome to Alert Users “Always Use Secure Connections” While Opening Public HTTP Sites appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


