AMD Patches Multi Vulnerabilities in Embedded Processors
AMD has released security updates addressing multiple vulnerabilities in its EPYC and Ryzen Embedded processors, some of which The post AMD Patches Multi Vulnerabilities in Embedded Processors appeared...
View ArticleSonicWall Firewalls Under Attack: CVE-2024-53704 Exploited in the Wild, PoC...
A recently disclosed vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now under active attack. This high-severity flaw The post SonicWall Firewalls Under Attack: CVE-2024-53704...
View ArticleEarth Preta APT Group Evades Detection with Legitimate and Malicious Components
Researchers from Trend Micro’s Threat Hunting team have discovered a new campaign by the advanced persistent threat (APT) The post Earth Preta APT Group Evades Detection with Legitimate and Malicious...
View ArticleCVE-2025-21589 (CVSS 9.8): Critical Authentication Bypass Flaw in Juniper...
Juniper Networks has released an out-of-cycle security bulletin addressing a critical authentication bypass vulnerability in its Session Smart The post CVE-2025-21589 (CVSS 9.8): Critical...
View ArticleStealth Attack: EarthKapre Leverages Cloud and DLL Sideloading for Data...
Researchers at eSentire Threat Response Unit (TRU) uncovered a sophisticated cyber espionage campaign by RedCurl/EarthKapre, a threat group The post Stealth Attack: EarthKapre Leverages Cloud and DLL...
View ArticleCVE-2023-20198 & CVE-2023-20273: RedMike Attacks 1,000+ Cisco Devices in...
Cybersecurity researchers at Insikt Group have identified an ongoing cyber espionage campaign by RedMike (also tracked as Salt The post CVE-2023-20198 & CVE-2023-20273: RedMike Attacks 1,000+ Cisco...
View ArticleLibreOffice Vulnerabilities (CVE-2024-12425 & CVE-2024-12426): PoCs Released,...
Cybersecurity researchers at Codean Labs have discovered two vulnerabilities in LibreOffice, allowing arbitrary file writes and remote data The post LibreOffice Vulnerabilities (CVE-2024-12425 &...
View ArticleChinese Hackers Emperor Dragonfly Use Espionage Tools for Ransomware
Cybersecurity experts at Symantec report that the Chinese threat actor Emperor Dragonfly has employed tools previously associated with The post Chinese Hackers Emperor Dragonfly Use Espionage Tools for...
View ArticleZServers/XHost Bulletproof Hosting Down: 127 Servers Seized
Amsterdam police have dismantled the hosting provider ZServers/XHost, a platform that had been exploited as a hub for The post ZServers/XHost Bulletproof Hosting Down: 127 Servers Seized appeared first...
View ArticlePirateFi Removed: Malware Found in Steam Game
Valve has removed the video game PirateFi from its Steam platform after the discovery of embedded malicious software. The post PirateFi Removed: Malware Found in Steam Game appeared first on...
View ArticleOpenSSH Flaws CVE-2025-26465 & CVE-2025-26466 Expose Clients and Servers to...
The Qualys Threat Research Unit (TRU) has disclosed two newly identified vulnerabilities in OpenSSH, affecting both clients and The post OpenSSH Flaws CVE-2025-26465 & CVE-2025-26466 Expose Clients...
View ArticleTRIPLESTRENGTH Threat Actor Group : Ransomware, Mining, and Server Hacks
Google’s Threat Analysis Group has unveiled information about a previously unknown threat actor group known as TRIPLESTRENGTH, which The post TRIPLESTRENGTH Threat Actor Group : Ransomware, Mining, and...
View Article90,000 Sites at Risk: Jupiter X Core RCE Vulnerability (CVE-2025-0366)
A vulnerability has been discovered and patched in the popular Jupiter X Core WordPress plugin, which boasts over The post 90,000 Sites at Risk: Jupiter X Core RCE Vulnerability (CVE-2025-0366)...
View ArticleCVE-2025-0999 & CVE-2025-1426: Chrome’s Latest Update Patches Major Security...
The Google Chrome stable channel has just received a crucial update, bringing it to version 133.0.6943.126/.127 for Windows The post CVE-2025-0999 & CVE-2025-1426: Chrome’s Latest Update Patches...
View ArticleLumma Stealer Malware Campaign Targets Educational Institutions with...
A new report from CloudSEK reveals an ongoing malware campaign distributing the Lumma Stealer information stealer, primarily targeting The post Lumma Stealer Malware Campaign Targets Educational...
View ArticleExploit Code Published for Critical GatesAir Transmitter Vulnerabilities, No...
Security researcher Mohamed Shahat has disclosed three critical vulnerabilities affecting GatesAir Maxiva UAXT and VAXT transmitters. These widely The post Exploit Code Published for Critical GatesAir...
View ArticleNew XELERA Ransomware Campaign Spreading Through Malicious Documents
A newly discovered ransomware campaign, dubbed XELERA, is targeting job seekers in India with fraudulent Food Corporation of The post New XELERA Ransomware Campaign Spreading Through Malicious...
View ArticleXerox Versalink Printers Vulnerable to Pass-Back Attacks, Credentials at Risk
Rapid7 researchers have discovered vulnerabilities in Xerox Versalink C7025 multifunction printers that could allow attackers to steal user The post Xerox Versalink Printers Vulnerable to Pass-Back...
View ArticleAnonymous VPS Provider BitLaunch Under Fire for Facilitating Ransomware Attacks
Independent security researcher BushidoToken release of a report that delves deep into the murky world of anonymous VPS The post Anonymous VPS Provider BitLaunch Under Fire for Facilitating Ransomware...
View ArticleUS Threatens UK Over iCloud Backdoor Demand
American lawmakers are demanding that newly appointed Director of National Intelligence Tulsi Gabbard reaffirm her firm stance on The post US Threatens UK Over iCloud Backdoor Demand appeared first on...
View Article