Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
Hardware Security Vulnerability3 Min Read September 16, 2025 Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5)…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Google Security2 Min Read September 15, 2025 Google confirms fraudulent account created in law enforcement portal Google has confirmed that hackers created a fraudulent account in its Law Enforcement Request System (LERS) platform that law enforcement uses…
Security3 Min Read September 15, 2025 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Vulnerabilities2 Min Read September 15, 2025 Critical LangChainGo Vulnerability Let Attackers Access Sensitive Files by Injecting Malicious Prompts A high-severity vulnerability was identified in LangChainGo, the Go implementation of the popular LLM orchestration framework LangChain. …
Cloud Security Malware Ransomware Windows2 Min Read September 15, 2025 OpenAI’s New Grove Incubator Is Building the Next Generation of AI Startups OpenAI recently unveiled its internal incubation initiative, OpenAI Grove. Unlike traditional startup accelerators or incubator programs,…
Exploits Vulnerabilities2 Min Read September 15, 2025 IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Malware Phishing Ransomware Windows7 Min Read September 15, 2025 ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its…
Exploits Network Vulnerabilities Web Security3 Min Read September 15, 2025 FlowiseAI Password Reset Token Vulnerability Allows Account Takeover A critical vulnerability affecting FlowiseAI’s Flowise platform has been disclosed, revealing a severe authentication bypass flaw that…
Cryptocurrency Malware2 Min Read September 15, 2025 HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…
DDoS Exploits Linux Vulnerabilities2 Min Read September 15, 2025 Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…
Android Cyber Attack Cybersecurity Meta Samsung Security Vulnerability WhatsApp2 Min Read September 14, 2025 Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The issue,…
Security3 Min Read September 14, 2025 FBI warns of UNC6040, UNC6395 hackers stealing Salesforce data The FBI has issued a FLASH alert warning that two threat clusters, tracked as UNC6040 and UNC6395, are compromising organizations’…
Security2 Min Read September 14, 2025 New VoidProxy phishing service targets Microsoft 365, Google accounts A newly discovered phishing-as-a-service (PhaaS) platform, named VoidProxy, targets Microsoft 365 and Google accounts, including those…
Android Apple Ransomware Web Security4 Min Read September 13, 2025 Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have…
AitM Cyber Attack Cybersecurity Google MFA Microsoft Okta PhaaS Phishing Phishing Scam Security VoidProxy2 Min Read September 13, 2025 New VoidProxy Phishing Service Bypasses MFA on Microsoft and Google Accounts Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique…
Cyber Attack Data Breach3 Min Read September 13, 2025 FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two…
Linux Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 Google Chrome Patches Critical Security Flaws in September 2025 Update In early September 2025, Google released an important security update for its Chrome browser—version 140.0.7339.127—to patch two…
Apple Malware Vulnerabilities Windows3 Min Read September 13, 2025 Samsung fixes Android 0-day that may have been used to spy on WhatsApp messages Samsung has fixed a critical flaw that affects its Android devices - but not before attackers found and exploited the bug, which could allow…
Android Exploits Vulnerabilities2 Min Read September 13, 2025 Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…
Uncategorized2 Min Read September 13, 2025 Microsoft Patch for Old Flaw Reveals New Kernel Address Leak Vulnerability in Windows 11/Server 2022 24H2 A new kernel address leak vulnerability has been discovered in the latest versions of Windows 11 (24H2) and Windows Server 2022 (24H2). The…
Mobile Security Vulnerability1 Min Read September 13, 2025 Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks Samsung has released its monthly security updates for Android, including a fix for a security vulnerability that it said has been exploited in…
China Cyber Attack Cybersecurity Fraud Hiddengh0st Malware Scam Scams and Fraud Security SEO Poisoning Winos2 Min Read September 12, 2025 SEO Poisoning Attack Hits Windows Users With Hiddengh0st and Winos Malware New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos…
BreachForums Cyber Crime Cybersecurity Google Jaguar Land Rover Lapsus$ Salesforce Scattered Lapsus$ Hunters Scattered Spider ShinyHunters2 Min Read September 12, 2025 Scattered Lapsus$ Hunters Hacker Group Announces Shutdown Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is fracturing under…
AI Security Vulnerability4 Min Read September 12, 2025 Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a…
Data Breach DDoS Phishing Vulnerabilities2 Min Read September 12, 2025 Unveiling VoidProxy: The Phishing-as-a-Service That Bypasses MFA Ddos September 12, 2025 Domain pattern for Google phishing pages | Image: Okta Okta Threat Intelligence has published a detailed analysis of…
Exploits Linux Vulnerabilities2 Min Read September 11, 2025 New VMScape Spectre-BTI Attack Exploits Isolation Gaps in AMD and Intel CPUs A novel speculative execution attack named VMSCAPE allows a malicious virtual machine (VM) to breach its security boundaries and…
Agentic AI AppSheet Cybersecurity Fraud Google Google Workspace Phishing Phishing Scam Raven AI Scam Security3 Min Read September 11, 2025 New Google AppSheet Phishing Scam Deliver Fake Trademark Notices A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools…
Artificial Intelligence Mobile Security2 Min Read September 11, 2025 Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard…
Malware Phishing Ransomware Windows3 Min Read September 11, 2025 12 Ways to Protect Your Business from Hackers During Remote Work Michelle MooreUniversity of San Diego’sSeptember 11, 2025 Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%)…
Network Phishing Vulnerabilities Windows2 Min Read September 11, 2025 Palo Alto Networks User-ID Credential Agent Vulnerability Exposes password In Cleartext A newly disclosed vulnerability in Palo Alto Networks’ User-ID Credential Agent for Windows, identified as CVE-2025-4235, could…
Apple ChillyHell Cybersecurity Malware MATANBUCHUS Security2 Min Read September 11, 2025 ChillyHell macOS Malware Resurfaces, Using Google.com as a Decoy A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install…
DDoS Exploits Malware Vulnerabilities2 Min Read September 11, 2025 NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an…
Browser Security Malvertising3 Min Read September 11, 2025 Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake websites to…
DDoS Ransomware Vulnerabilities Windows20 Min Read September 11, 2025 Vulnerability Management – common understanding and language enable teamwork Part of a series This Blog post is part of the series Vulnerability Management Series: 3D (Definition, Deep-Dive, and Difficulties) Part 1…
DDoS Network Ransomware Vulnerabilities2 Min Read September 11, 2025 ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks The Australian Cyber Security Centre (ACSC) has issued a critical alert regarding a severe access control vulnerability in…
Credential Theft Malware2 Min Read September 11, 2025 AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate Remote Monitoring…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 11, 2025 Beyond Cobalt Strike: A New Open-Source Hacking Tool Is on the Rise Ddos September 11, 2025 Researchers at Palo Alto Networks’ Unit 42 have published a report detailing the rise of AdaptixC2, an open-source…
APT China Cyber Attack Cyber Attacks Cybersecurity EggStreme EggStremeAgent Malware Military Philippine Security2 Min Read September 10, 2025 Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations.…