[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @The_Cyber_News Cyber Security News Cyber Security News posts on X about microsoft, microsoft teams, poc, amazon web services the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXXX engagements in the last XX hours. ### Engagements: XXXXXX [#](/creator/twitter::1165106855879704577/interactions)  - X Week XXXXXXX -XX% - X Month XXXXXXX +724% - X Months XXXXXXXXX +1,202% - X Year XXXXXXXXX +2,219% ### Mentions: XX [#](/creator/twitter::1165106855879704577/posts_active)  - X Week XX no change - X Month XX +38% - X Months XXX +58% - X Year XXX +65% ### Followers: XXXXXX [#](/creator/twitter::1165106855879704577/followers)  - X Week XXXXXX +2.60% - X Month XXXXXX +19% - X Months XXXXXX +74% - X Year XXXXXX +208% ### CreatorRank: XXXXXXX [#](/creator/twitter::1165106855879704577/influencer_rank)  ### Social Influence [#](/creator/twitter::1165106855879704577/influence) --- **Social category influence** [technology brands](/list/technology-brands) XXXXX% [stocks](/list/stocks) XXXXX% [social networks](/list/social-networks) XXXX% [countries](/list/countries) XXXX% **Social topic influence** [microsoft](/topic/microsoft) #209, [microsoft teams](/topic/microsoft-teams) 2.78%, [poc](/topic/poc) #23, [amazon web services](/topic/amazon-web-services) #409, [has been](/topic/has-been) 2.78%, [$ai4](/topic/$ai4) 1.39%, [capabilities](/topic/capabilities) 1.39%, [artificial](/topic/artificial) 1.39%, [large language model](/topic/large-language-model) 1.39%, [cybersecurity](/topic/cybersecurity) XXXX% **Top accounts mentioned or mentioned by** [@thecybernews](/creator/undefined) [@jiltedvalkyrie](/creator/undefined) [@xandr0ss](/creator/undefined) [@parallex001](/creator/undefined) [@kfluffy3](/creator/undefined) [@mathieuchateau](/creator/undefined) [@nitingavhane_](/creator/undefined) [@lumutech](/creator/undefined) [@lorionliberty](/creator/undefined) [@cchanabo](/creator/undefined) [@vaevictis_cyber](/creator/undefined) [@ruskinetgroup](/creator/undefined) [@whitehead4jeff](/creator/undefined) [@sschaeperklaus](/creator/undefined) [@darkwebinformer](/creator/undefined) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) [Artificial Intelligence (AI4)](/topic/$ai4) [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) ### Top Social Posts [#](/creator/twitter::1165106855879704577/posts) --- Top posts by engagements in the last XX hours "🛠 Microsoft Teams to Introduce Highly Anticipated Multitasking Functionality Read more: Microsoft is set to roll out a highly anticipated multitasking feature for its Teams platform which will allow users to open channels in separate windows. This long-awaited update scheduled for release in November addresses one of the most common user requests and promises to improve workflow efficiency for millions of users significantly. According to the Microsoft XXX Roadmap the update tracked as feature ID: 509110 will enable users to break free from the single-window interface that has defined" [X Link](https://x.com/The_Cyber_News/status/1975555353032155298) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-07T13:34Z 26.4K followers, 1678 engagements "🚨 Hackers Abuse Teams Features and Capabilities to Deliver Malware Read more: Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing the features and capabilities of Microsoft Teams throughout their attack chains. Threat actors abuse its core capabilities messaging (chat) calls and meetings and video-based screen-sharing at different points along the attack chain. Attackers are leveraging the entire attack lifecycle within the Teams ecosystem from initial reconnaissance to final impact Microsoft said. #cybersecuritynews" [X Link](https://x.com/The_Cyber_News/status/1975744345329578037) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-08T02:05Z 26.4K followers, 15.7K engagements "🚨 7-Zip Vulnerabilities Let Attackers Execute Arbitrary Code Remotely Read more: Two high-severity vulnerabilities have been discovered in the popular open-source file archiver 7-Zip which could allow remote attackers to execute arbitrary code. Identified as CVE-2025-11001 and CVE-2025-11002 the flaws affect all versions of the software prior to the latest release and require immediate patching. The core of both vulnerabilities lies within the way 7-Zip handles symbolic links embedded in ZIP archives. When a user with a vulnerable version of 7-Zip attempts to decompress the archive the" [X Link](https://x.com/The_Cyber_News/status/1976533769659031704) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-10T06:22Z 26.4K followers, 136.1K engagements "🚨 Windows Rust Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error Read more: A vulnerability in Microsoft's newly implemented Rust-based kernel component for the Graphics Device Interface (GDI) in Windows. This flaw which could trigger a system-wide crash via a Blue Screen of Death (BSOD) highlights the challenges of integrating memory-safe languages into critical OS components. The vulnerability emerged during a targeted fuzzing campaign aimed at probing Windows' graphics subsystem for weaknesses. Fuzzing a technique that bombards software with malformed inputs to expose" [X Link](https://x.com/The_Cyber_News/status/1979158727719616942) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-17T12:13Z 26.4K followers, 2070 engagements "🛠 New Kali Tool -- Uses Nmap For Network Scanning Capabilities Read more: Along with the release ofKali Linux 2025.3 a major update introduces an innovative tool that combines artificial intelligence and cybersecurity: the llm-tools-nmap. A new experimental plugin llm-tools-nmap providing command-line Large Language Model (LLM) tool with network scanning capabilities. This package integrates the powerful and widely used Nmap security scanner enabling LLMs to perform network discovery and security auditing tasks through function calling. To Get Daily Security Updates add Cyber Security News" [X Link](https://x.com/The_Cyber_News/status/1976905209562435921) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-11T06:58Z 26.3K followers, 26.7K engagements "🚨 Hackers Use DFIR Tool 'Velociraptor' to Attack VMware ESXi and Windows Servers with Ransomware Read more: Ransomware operators are actively exploiting Velociraptor an open-source digital forensics and incident response (DFIR) tool in their attacks. The attack severely impacted the victims IT environment encrypting VMware ESXi virtual machines and Windows servers using Warlock LockBit and Babuk ransomware. Velociraptor is designed for security teams to perform endpoint monitoring and data collection but in this campaign it played a key role in helping the attackers maintain stealthy" [X Link](https://x.com/The_Cyber_News/status/1976476347355500710) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-10T02:34Z 26.4K followers, 25.9K engagements "🚨 Windows Remote Access Connection Manager 0-Day Vulnerability Actively Exploited in Attacks Read more: Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service allowing attackers to escalate privileges and potentially compromise entire systems. Tracked as CVE-2025-59230 the flaw stems from improper access control enabling low-privileged users to gain SYSTEM-level access. The vulnerability affects multiple Windows versions and has already drawn attention from threat actors targeting enterprise" [X Link](https://x.com/The_Cyber_News/status/1978414465944023291) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-15T10:55Z 26.4K followers, 18.4K engagements "⚠ F5 Released Security Updates Covering Multiple Products Following Recent Hack Read more: F5 Networks a leading provider of application security and delivery solutions has disclosed a significant security breach involving a nation-state threat actor prompting the release of critical updates for its core products. In response F5 has rolled out patches across BIG-IP F5OS BIG-IQ APM clients and BIG-IP Next for Kubernetes to safeguard customers amid heightened risks. F5 published its Quarterly Security Notification detailing XX vulnerabilities addressed in the latest releases many tied to the" [X Link](https://x.com/The_Cyber_News/status/1979089938030153869) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-17T07:39Z 26.4K followers, 6656 engagements "🚨 PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution Read more: A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip potentially allowing attackers to execute arbitrary code remotely through malicious ZIP files. The flaws tracked as CVE-2025-11001 and CVE-2025-11002 were disclosed by the Zero Day Initiative (ZDI) on October X 2025 and stem from improper handling of symbolic links during ZIP extraction on Windows systems. The core problem lies in 7-Zip's extraction logic which fails to properly validate symlink targets. When" [X Link](https://x.com/The_Cyber_News/status/1979491144208617738) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-18T10:14Z 26.4K followers, 15.1K engagements "🛠 Windows XX 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode Read more: Microsofts latest security update has rendered USB keyboards and mice inoperable within the Windows Recovery Environment (WinRE). Released on October XX 2025 as KB5066835 for OS Build 26100.6899 the patch affects Windows XX versions 24H2 and 25H2 as well as Windows Server 2025. The glitch emerged shortly after installation leaving users unable to navigate recovery options during system troubleshooting. The problem surfaces specifically in WinRE a critical boot mode for repairing boot failures resetting PCs or" [X Link](https://x.com/The_Cyber_News/status/1979746489518703022) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-19T03:08Z 26.4K followers, 17.4K engagements "🔻 AWS Outage Impacts Amazon Snapchat Prime Video Canva and More - Update Read more: A widespread Amazon Web Services (AWS) outage on Monday disrupted operations for millions of users worldwide knocking out access to everything from streaming giants to social media platforms and financial apps. The incident which began early in the morning affected high-profile services like Amazon's own e-commerce site Snapchat Prime Video Canva and countless others reliant on AWS infrastructure. To Get Daily Security Updates add Cyber Security News as your preferred source on Google - #cybersecuritynews" [X Link](https://x.com/The_Cyber_News/status/1980262666599010554) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-20T13:19Z 26.4K followers, 8214 engagements "⚠ OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Read more: A new command injection vulnerability in OpenSSH tracked as CVE-2025-61984 has been disclosed which could allow an attacker to achieve remote code execution on a victim's machine. The core of the vulnerability lies in OpenSSH's failure to properly sanitize control characters such as newlines within usernames. An attacker can create a username that includes a newline character followed by a malicious command. When a shell like Bash Fish or csh processes the ProxyCommand the crafted syntax error on the first" [X Link](https://x.com/The_Cyber_News/status/1975449905515868481) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-07T06:35Z 26.3K followers, 39K engagements "🚨 Hackers Attacking Remote Desktop Protocol Services from 100000+ IP Addresses Read more: A massive coordinated botnet campaign is actively targeting Remote Desktop Protocol (RDP) services across the United States. The operation appears to be centrally controlled with the primary objective of compromising RDP infrastructure a critical component for remote work and administration. The first is an RD Web Access timing attack a method where attackers measure the servers response time to login attempts. The second vector is an RDP web client login enumeration which systematically attempts to" [X Link](https://x.com/The_Cyber_News/status/1977054156839174168) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-11T16:50Z 26.3K followers, 21.4K engagements "⚠ Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication Read more: Critical flaws were uncovered in the network communication between Microsoft Defender for Endpoint (DFE) and its cloud services allowing post-breach attackers to bypass authentication spoof data disclose sensitive information and even upload malicious files to investigation packages. The research builds on prior explorations of EDR attack surfaces focusing on the agents interaction with cloud backends. By intercepting traffic using tools like Burp Suite and bypassing certificate pinning through memory" [X Link](https://x.com/The_Cyber_News/status/1977260940799214077) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-12T06:31Z 26.3K followers, 34.8K engagements "🗼 UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200000+ Laptops Read more: Hackers can exploit vulnerabilities in signed UEFI shells to bypass Secure Boot protections on over 200000 Framework laptops and desktops. These vulnerabilities expose fundamental flaws in how modern systems trust boot components potentially enabling persistent malware infections that evade detection. As pre-operating system attacks grow more common echoing threats like BlackLotus and Bootkitty this discovery underscores the risks lurking in the firmware layer we often overlook. To Get Daily" [X Link](https://x.com/The_Cyber_News/status/1978146439873118331) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-14T17:10Z 26.3K followers, 8420 engagements "🔐 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Read more: Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature allowing attackers with physical access to bypass security protections and access encrypted data. Released as part of the latest Patch Tuesday updates these flaws tracked as CVE-2025-55338 and CVE-2025-55333 pose a significant risk to users relying on BitLocker for full-disk encryption on Windows devices. These new issues stem from flaws in how the system handles ROM code patching and data comparisons enabling" [X Link](https://x.com/The_Cyber_News/status/1978737191971954926) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-16T08:18Z 26.3K followers, 12.9K engagements "⚠ CrowdStrike Falcon Windows Sensor Vulnerability Enables Code Execution and File Deletion Read more: CrowdStrike has disclosed and released patches for two medium-severity vulnerabilities in its Falcon sensor for Windows that could allow an attacker to delete arbitrary files. The security vulnerabilities designated as CVE-2025-42701 and CVE-2025-42706 require an attacker to have already gained the ability to execute code on a target system. 📌 CVE-2025-42701 - Time-of-check Time-of-use (TOCTOU) race condition 📌 CVE-2025-42706 - logic error related to origin validation #cybersecuritynews" [X Link](https://x.com/The_Cyber_News/status/1976113593415598205) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-09T02:32Z 26.4K followers, 27.3K engagements "🚨 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Read more: Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October XX 2025 that could enable local authenticated attackers to execute arbitrary system commands. Tracked as CVE-2025-58325 the flaw stems from an incorrect provision of specified functionality (CWE-684) in the CLI component potentially leading to privilege escalation. This could result in full control over the device data exfiltration or further network compromise. No remote exploitation is possible but the low" [X Link](https://x.com/The_Cyber_News/status/1978339035899674724) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-15T05:55Z 26.4K followers, 23K engagements "🚨 Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Read more: Microsoft has patched a critical flaw in its Remote Desktop Client that could allow attackers to execute malicious code on victims systems. The flaw affects the Remote Desktop Client a core component for connecting to remote machines. An unauthorized attacker could leverage it over a network by tricking a user into connecting to a malicious RDP server. Once connected the server exploits the use-after-free bug to run arbitrary code in the users context potentially leading to full system compromise. To" [X Link](https://x.com/The_Cyber_News/status/1978368657345454147) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-15T07:53Z 26.4K followers, 10.4K engagements "⚠ PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Read more: A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941. This vulnerability stems from the heart of Linux operating systems enabling attackers with local access to exploit symlink attacks and race conditions for full root privilege escalation. Affected systems include all versions of Linux-PAM prior to the latest patches spanning distributions like Ubuntu Fedora and Red Hat Enterprise Linux. No remote exploitation is possible" [X Link](https://x.com/The_Cyber_News/status/1979903730775736782) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-19T13:33Z 26.4K followers, 7797 engagements "--- . . Latvian authorities together with Europol Eurojust and investigators from Austria and Estonia carried out a massive coordinated action against a cybercrime group. 🔹 X Latvian cybercriminals arrested 🔹 X additional suspects detained 🔹 X servers taken down 🔹 1200 SIM box devices & 40000 active SIM cards seized This criminal network was behind large-scale SIM fraud operations enabling thousands of cyber fraud cases across Europe. Investigators have linked: 1700 fraud cases in Austria XXX million in losses 1500 fraud cases in Latvia 420000 in losses #cybersecurity #cybercrime #europol" [X Link](https://x.com/The_Cyber_News/status/1980183753084514587) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-20T08:06Z 26.4K followers, 2915 engagements "🚨 CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks Read more: CISA issued an urgent alert on October XX 2025 highlighting a severe vulnerability CVE-2025-33073 in Microsoft's Windows SMB Client. The vulnerability exploits the Server Message Block (SMB) protocol a cornerstone of Windows file sharing and network communications. This forced authentication grants unauthorized access potentially allowing full control over the compromised device. Attackers leverage this vulnerability through social engineering or drive-by downloads where users accidentaly execute the malicious" [X Link](https://x.com/The_Cyber_News/status/1980468061967904841) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-21T02:55Z 26.4K followers, 15K engagements "🌐 AWS Declares Major Outage Resolved After Nearly XX Hours of Disruption Read more: Amazon Web Services (AWS) the world's largest cloud computing provider has officially marked a widespread outage in its US-EAST-1 region as resolved following nearly a full day of cascading failures that disrupted services for millions worldwide. The incident which began late on October XX 2025 and persisted until early afternoon on October XX highlighted the fragility of global internet infrastructure reliant on AWS's backbone. By 3:01 PM PDT AWS confirmed all services had returned to normal operations" [X Link](https://x.com/The_Cyber_News/status/1980507006730711335) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-21T05:30Z 26.4K followers, 2559 engagements "🚨 Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2200 IPs Read more: A massive escalation in attacks targeting Palo Alto Networks PAN-OS GlobalProtect login portals with over 2200 unique IP addresses conducting reconnaissance operations as of October X 2025. This represents a significant surge from the initial 1300 IPs observed just days earlier marking the highest scanning activity recorded in the past XX days according to GreyNoise Intelligence monitoring. The reconnaissance campaign began with a sharp XXX% increase in scanning activity on October X 2025 when" [X Link](https://x.com/The_Cyber_News/status/1975862259583992037) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-08T09:54Z 26.4K followers, 11.4K engagements "Hackers Can Bypass OpenAI Guardrails Using a Simple Prompt Injection Technique Read more: OpenAI's newly launched Guardrails framework designed to enhance AI safety by detecting harmful behaviors has been swiftly compromised by researchers using basic prompt injection methods. Attackers can manipulate both the generating model and its safety judge simultaneously generating dangerous content without alerts. At the core of the vulnerability lies the "same model different hat" problem: using LLMs to both create responses and evaluate their safety exposes both to identical attacks. The jailbreak" [X Link](https://x.com/The_Cyber_News/status/1977983661451407393) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-14T06:23Z 26.4K followers, 3086 engagements "🛠 New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability Read more: A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept exploit raising alarms for Linux system administrators worldwide. CVE-2025-32463 targets the chroot feature in Sudo versions 1.9.14 through 1.9.17 enabling local attackers to escalate privileges to root level with minimal effort. The issue rated at a CVSS score of XXX critical underscores ongoing risks in privilege management tools essential to Unix-like operating systems." [X Link](https://x.com/The_Cyber_News/status/1978008791816753648) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-14T08:03Z 26.4K followers, 24.4K engagements "⚠ Microsoft Security Update Causes Active Directory Sync Failures on Windows Server 2025 Read more: Microsoft's security updates have triggered synchronization failures in Active Directory environments running on Windows Server 2025. The issue confirmed on October XX 2025 affects directory synchronization for large security groups potentially halting critical identity management processes across enterprise networks. Applications relying on the Active Directory directory synchronization (DirSync) control such as Microsoft Entra Connect Sync fail to replicate AD security groups with more than" [X Link](https://x.com/The_Cyber_News/status/1978644632868401436) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-16T02:10Z 26.4K followers, 4775 engagements "🚨 M365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Read more: A sophisticated vulnerability in Microsoft XXX Copilot (M365 Copilot) that allows attackers to steal sensitive tenant data including recent emails through indirect prompt injection attacks. The attack begins when a user asks M365 Copilot to summarize a maliciously crafted Excel spreadsheet. Hidden instructions embedded in white text across multiple sheets use progressive task modification and nested commands to hijack the AIs behavior. #cybersecuritynews" [X Link](https://x.com/The_Cyber_News/status/1980664239514947846) [@The_Cyber_News](/creator/x/The_Cyber_News) 2025-10-21T15:55Z 26.4K followers, 15.5K engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Cyber Security News posts on X about microsoft, microsoft teams, poc, amazon web services the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXXX engagements in the last XX hours.
Social category influence technology brands XXXXX% stocks XXXXX% social networks XXXX% countries XXXX%
Social topic influence microsoft #209, microsoft teams 2.78%, poc #23, amazon web services #409, has been 2.78%, $ai4 1.39%, capabilities 1.39%, artificial 1.39%, large language model 1.39%, cybersecurity XXXX%
Top accounts mentioned or mentioned by @thecybernews @jiltedvalkyrie @xandr0ss @parallex001 @kfluffy3 @mathieuchateau @nitingavhane_ @lumutech @lorionliberty @cchanabo @vaevictis_cyber @ruskinetgroup @whitehead4jeff @sschaeperklaus @darkwebinformer
Top assets mentioned Microsoft Corp. (MSFT) Artificial Intelligence (AI4) Crowdstrike Holdings Inc (CRWD)
Top posts by engagements in the last XX hours
"🛠 Microsoft Teams to Introduce Highly Anticipated Multitasking Functionality Read more: Microsoft is set to roll out a highly anticipated multitasking feature for its Teams platform which will allow users to open channels in separate windows. This long-awaited update scheduled for release in November addresses one of the most common user requests and promises to improve workflow efficiency for millions of users significantly. According to the Microsoft XXX Roadmap the update tracked as feature ID: 509110 will enable users to break free from the single-window interface that has defined"
X Link @The_Cyber_News 2025-10-07T13:34Z 26.4K followers, 1678 engagements
"🚨 Hackers Abuse Teams Features and Capabilities to Deliver Malware Read more: Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing the features and capabilities of Microsoft Teams throughout their attack chains. Threat actors abuse its core capabilities messaging (chat) calls and meetings and video-based screen-sharing at different points along the attack chain. Attackers are leveraging the entire attack lifecycle within the Teams ecosystem from initial reconnaissance to final impact Microsoft said. #cybersecuritynews"
X Link @The_Cyber_News 2025-10-08T02:05Z 26.4K followers, 15.7K engagements
"🚨 7-Zip Vulnerabilities Let Attackers Execute Arbitrary Code Remotely Read more: Two high-severity vulnerabilities have been discovered in the popular open-source file archiver 7-Zip which could allow remote attackers to execute arbitrary code. Identified as CVE-2025-11001 and CVE-2025-11002 the flaws affect all versions of the software prior to the latest release and require immediate patching. The core of both vulnerabilities lies within the way 7-Zip handles symbolic links embedded in ZIP archives. When a user with a vulnerable version of 7-Zip attempts to decompress the archive the"
X Link @The_Cyber_News 2025-10-10T06:22Z 26.4K followers, 136.1K engagements
"🚨 Windows Rust Kernel GDI Vulnerability Leads to Crash and Blue Screen of Death Error Read more: A vulnerability in Microsoft's newly implemented Rust-based kernel component for the Graphics Device Interface (GDI) in Windows. This flaw which could trigger a system-wide crash via a Blue Screen of Death (BSOD) highlights the challenges of integrating memory-safe languages into critical OS components. The vulnerability emerged during a targeted fuzzing campaign aimed at probing Windows' graphics subsystem for weaknesses. Fuzzing a technique that bombards software with malformed inputs to expose"
X Link @The_Cyber_News 2025-10-17T12:13Z 26.4K followers, 2070 engagements
"🛠 New Kali Tool -- Uses Nmap For Network Scanning Capabilities Read more: Along with the release ofKali Linux 2025.3 a major update introduces an innovative tool that combines artificial intelligence and cybersecurity: the llm-tools-nmap. A new experimental plugin llm-tools-nmap providing command-line Large Language Model (LLM) tool with network scanning capabilities. This package integrates the powerful and widely used Nmap security scanner enabling LLMs to perform network discovery and security auditing tasks through function calling. To Get Daily Security Updates add Cyber Security News"
X Link @The_Cyber_News 2025-10-11T06:58Z 26.3K followers, 26.7K engagements
"🚨 Hackers Use DFIR Tool 'Velociraptor' to Attack VMware ESXi and Windows Servers with Ransomware Read more: Ransomware operators are actively exploiting Velociraptor an open-source digital forensics and incident response (DFIR) tool in their attacks. The attack severely impacted the victims IT environment encrypting VMware ESXi virtual machines and Windows servers using Warlock LockBit and Babuk ransomware. Velociraptor is designed for security teams to perform endpoint monitoring and data collection but in this campaign it played a key role in helping the attackers maintain stealthy"
X Link @The_Cyber_News 2025-10-10T02:34Z 26.4K followers, 25.9K engagements
"🚨 Windows Remote Access Connection Manager 0-Day Vulnerability Actively Exploited in Attacks Read more: Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service allowing attackers to escalate privileges and potentially compromise entire systems. Tracked as CVE-2025-59230 the flaw stems from improper access control enabling low-privileged users to gain SYSTEM-level access. The vulnerability affects multiple Windows versions and has already drawn attention from threat actors targeting enterprise"
X Link @The_Cyber_News 2025-10-15T10:55Z 26.4K followers, 18.4K engagements
"⚠ F5 Released Security Updates Covering Multiple Products Following Recent Hack Read more: F5 Networks a leading provider of application security and delivery solutions has disclosed a significant security breach involving a nation-state threat actor prompting the release of critical updates for its core products. In response F5 has rolled out patches across BIG-IP F5OS BIG-IQ APM clients and BIG-IP Next for Kubernetes to safeguard customers amid heightened risks. F5 published its Quarterly Security Notification detailing XX vulnerabilities addressed in the latest releases many tied to the"
X Link @The_Cyber_News 2025-10-17T07:39Z 26.4K followers, 6656 engagements
"🚨 PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution Read more: A proof-of-concept exploit for two critical vulnerabilities in the popular file archiver 7-Zip potentially allowing attackers to execute arbitrary code remotely through malicious ZIP files. The flaws tracked as CVE-2025-11001 and CVE-2025-11002 were disclosed by the Zero Day Initiative (ZDI) on October X 2025 and stem from improper handling of symbolic links during ZIP extraction on Windows systems. The core problem lies in 7-Zip's extraction logic which fails to properly validate symlink targets. When"
X Link @The_Cyber_News 2025-10-18T10:14Z 26.4K followers, 15.1K engagements
"🛠 Windows XX 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode Read more: Microsofts latest security update has rendered USB keyboards and mice inoperable within the Windows Recovery Environment (WinRE). Released on October XX 2025 as KB5066835 for OS Build 26100.6899 the patch affects Windows XX versions 24H2 and 25H2 as well as Windows Server 2025. The glitch emerged shortly after installation leaving users unable to navigate recovery options during system troubleshooting. The problem surfaces specifically in WinRE a critical boot mode for repairing boot failures resetting PCs or"
X Link @The_Cyber_News 2025-10-19T03:08Z 26.4K followers, 17.4K engagements
"🔻 AWS Outage Impacts Amazon Snapchat Prime Video Canva and More - Update Read more: A widespread Amazon Web Services (AWS) outage on Monday disrupted operations for millions of users worldwide knocking out access to everything from streaming giants to social media platforms and financial apps. The incident which began early in the morning affected high-profile services like Amazon's own e-commerce site Snapchat Prime Video Canva and countless others reliant on AWS infrastructure. To Get Daily Security Updates add Cyber Security News as your preferred source on Google - #cybersecuritynews"
X Link @The_Cyber_News 2025-10-20T13:19Z 26.4K followers, 8214 engagements
"⚠ OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Read more: A new command injection vulnerability in OpenSSH tracked as CVE-2025-61984 has been disclosed which could allow an attacker to achieve remote code execution on a victim's machine. The core of the vulnerability lies in OpenSSH's failure to properly sanitize control characters such as newlines within usernames. An attacker can create a username that includes a newline character followed by a malicious command. When a shell like Bash Fish or csh processes the ProxyCommand the crafted syntax error on the first"
X Link @The_Cyber_News 2025-10-07T06:35Z 26.3K followers, 39K engagements
"🚨 Hackers Attacking Remote Desktop Protocol Services from 100000+ IP Addresses Read more: A massive coordinated botnet campaign is actively targeting Remote Desktop Protocol (RDP) services across the United States. The operation appears to be centrally controlled with the primary objective of compromising RDP infrastructure a critical component for remote work and administration. The first is an RD Web Access timing attack a method where attackers measure the servers response time to login attempts. The second vector is an RDP web client login enumeration which systematically attempts to"
X Link @The_Cyber_News 2025-10-11T16:50Z 26.3K followers, 21.4K engagements
"⚠ Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication Read more: Critical flaws were uncovered in the network communication between Microsoft Defender for Endpoint (DFE) and its cloud services allowing post-breach attackers to bypass authentication spoof data disclose sensitive information and even upload malicious files to investigation packages. The research builds on prior explorations of EDR attack surfaces focusing on the agents interaction with cloud backends. By intercepting traffic using tools like Burp Suite and bypassing certificate pinning through memory"
X Link @The_Cyber_News 2025-10-12T06:31Z 26.3K followers, 34.8K engagements
"🗼 UEFI Shell Vulnerabilities Could Allow Hackers to Bypass Secure Boot on 200000+ Laptops Read more: Hackers can exploit vulnerabilities in signed UEFI shells to bypass Secure Boot protections on over 200000 Framework laptops and desktops. These vulnerabilities expose fundamental flaws in how modern systems trust boot components potentially enabling persistent malware infections that evade detection. As pre-operating system attacks grow more common echoing threats like BlackLotus and Bootkitty this discovery underscores the risks lurking in the firmware layer we often overlook. To Get Daily"
X Link @The_Cyber_News 2025-10-14T17:10Z 26.3K followers, 8420 engagements
"🔐 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Read more: Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature allowing attackers with physical access to bypass security protections and access encrypted data. Released as part of the latest Patch Tuesday updates these flaws tracked as CVE-2025-55338 and CVE-2025-55333 pose a significant risk to users relying on BitLocker for full-disk encryption on Windows devices. These new issues stem from flaws in how the system handles ROM code patching and data comparisons enabling"
X Link @The_Cyber_News 2025-10-16T08:18Z 26.3K followers, 12.9K engagements
"⚠ CrowdStrike Falcon Windows Sensor Vulnerability Enables Code Execution and File Deletion Read more: CrowdStrike has disclosed and released patches for two medium-severity vulnerabilities in its Falcon sensor for Windows that could allow an attacker to delete arbitrary files. The security vulnerabilities designated as CVE-2025-42701 and CVE-2025-42706 require an attacker to have already gained the ability to execute code on a target system. 📌 CVE-2025-42701 - Time-of-check Time-of-use (TOCTOU) race condition 📌 CVE-2025-42706 - logic error related to origin validation #cybersecuritynews"
X Link @The_Cyber_News 2025-10-09T02:32Z 26.4K followers, 27.3K engagements
"🚨 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Read more: Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October XX 2025 that could enable local authenticated attackers to execute arbitrary system commands. Tracked as CVE-2025-58325 the flaw stems from an incorrect provision of specified functionality (CWE-684) in the CLI component potentially leading to privilege escalation. This could result in full control over the device data exfiltration or further network compromise. No remote exploitation is possible but the low"
X Link @The_Cyber_News 2025-10-15T05:55Z 26.4K followers, 23K engagements
"🚨 Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code Read more: Microsoft has patched a critical flaw in its Remote Desktop Client that could allow attackers to execute malicious code on victims systems. The flaw affects the Remote Desktop Client a core component for connecting to remote machines. An unauthorized attacker could leverage it over a network by tricking a user into connecting to a malicious RDP server. Once connected the server exploits the use-after-free bug to run arbitrary code in the users context potentially leading to full system compromise. To"
X Link @The_Cyber_News 2025-10-15T07:53Z 26.4K followers, 10.4K engagements
"⚠ PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation Read more: A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941. This vulnerability stems from the heart of Linux operating systems enabling attackers with local access to exploit symlink attacks and race conditions for full root privilege escalation. Affected systems include all versions of Linux-PAM prior to the latest patches spanning distributions like Ubuntu Fedora and Red Hat Enterprise Linux. No remote exploitation is possible"
X Link @The_Cyber_News 2025-10-19T13:33Z 26.4K followers, 7797 engagements
"--- . . Latvian authorities together with Europol Eurojust and investigators from Austria and Estonia carried out a massive coordinated action against a cybercrime group. 🔹 X Latvian cybercriminals arrested 🔹 X additional suspects detained 🔹 X servers taken down 🔹 1200 SIM box devices & 40000 active SIM cards seized This criminal network was behind large-scale SIM fraud operations enabling thousands of cyber fraud cases across Europe. Investigators have linked: 1700 fraud cases in Austria XXX million in losses 1500 fraud cases in Latvia 420000 in losses #cybersecurity #cybercrime #europol"
X Link @The_Cyber_News 2025-10-20T08:06Z 26.4K followers, 2915 engagements
"🚨 CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks Read more: CISA issued an urgent alert on October XX 2025 highlighting a severe vulnerability CVE-2025-33073 in Microsoft's Windows SMB Client. The vulnerability exploits the Server Message Block (SMB) protocol a cornerstone of Windows file sharing and network communications. This forced authentication grants unauthorized access potentially allowing full control over the compromised device. Attackers leverage this vulnerability through social engineering or drive-by downloads where users accidentaly execute the malicious"
X Link @The_Cyber_News 2025-10-21T02:55Z 26.4K followers, 15K engagements
"🌐 AWS Declares Major Outage Resolved After Nearly XX Hours of Disruption Read more: Amazon Web Services (AWS) the world's largest cloud computing provider has officially marked a widespread outage in its US-EAST-1 region as resolved following nearly a full day of cascading failures that disrupted services for millions worldwide. The incident which began late on October XX 2025 and persisted until early afternoon on October XX highlighted the fragility of global internet infrastructure reliant on AWS's backbone. By 3:01 PM PDT AWS confirmed all services had returned to normal operations"
X Link @The_Cyber_News 2025-10-21T05:30Z 26.4K followers, 2559 engagements
"🚨 Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2200 IPs Read more: A massive escalation in attacks targeting Palo Alto Networks PAN-OS GlobalProtect login portals with over 2200 unique IP addresses conducting reconnaissance operations as of October X 2025. This represents a significant surge from the initial 1300 IPs observed just days earlier marking the highest scanning activity recorded in the past XX days according to GreyNoise Intelligence monitoring. The reconnaissance campaign began with a sharp XXX% increase in scanning activity on October X 2025 when"
X Link @The_Cyber_News 2025-10-08T09:54Z 26.4K followers, 11.4K engagements
"Hackers Can Bypass OpenAI Guardrails Using a Simple Prompt Injection Technique Read more: OpenAI's newly launched Guardrails framework designed to enhance AI safety by detecting harmful behaviors has been swiftly compromised by researchers using basic prompt injection methods. Attackers can manipulate both the generating model and its safety judge simultaneously generating dangerous content without alerts. At the core of the vulnerability lies the "same model different hat" problem: using LLMs to both create responses and evaluate their safety exposes both to identical attacks. The jailbreak"
X Link @The_Cyber_News 2025-10-14T06:23Z 26.4K followers, 3086 engagements
"🛠 New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability Read more: A critical vulnerability in the widely used Sudo utility has come under scrutiny following the public release of a proof-of-concept exploit raising alarms for Linux system administrators worldwide. CVE-2025-32463 targets the chroot feature in Sudo versions 1.9.14 through 1.9.17 enabling local attackers to escalate privileges to root level with minimal effort. The issue rated at a CVSS score of XXX critical underscores ongoing risks in privilege management tools essential to Unix-like operating systems."
X Link @The_Cyber_News 2025-10-14T08:03Z 26.4K followers, 24.4K engagements
"⚠ Microsoft Security Update Causes Active Directory Sync Failures on Windows Server 2025 Read more: Microsoft's security updates have triggered synchronization failures in Active Directory environments running on Windows Server 2025. The issue confirmed on October XX 2025 affects directory synchronization for large security groups potentially halting critical identity management processes across enterprise networks. Applications relying on the Active Directory directory synchronization (DirSync) control such as Microsoft Entra Connect Sync fail to replicate AD security groups with more than"
X Link @The_Cyber_News 2025-10-16T02:10Z 26.4K followers, 4775 engagements
"🚨 M365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Read more: A sophisticated vulnerability in Microsoft XXX Copilot (M365 Copilot) that allows attackers to steal sensitive tenant data including recent emails through indirect prompt injection attacks. The attack begins when a user asks M365 Copilot to summarize a maliciously crafted Excel spreadsheet. Hidden instructions embedded in white text across multiple sheets use progressive task modification and nested commands to hijack the AIs behavior. #cybersecuritynews"
X Link @The_Cyber_News 2025-10-21T15:55Z 26.4K followers, 15.5K engagements
/creator/twitter::The_Cyber_News