Fluent Bit Vulnerabilities (CVE-2024-50608 & CVE-2024-50609) Could Disrupt...
Cybersecurity researchers at Ebryx have identified two vulnerabilities in Fluent Bit, a widely used open-source log processor and The post Fluent Bit Vulnerabilities (CVE-2024-50608 &...
View ArticleACRStealer Malware Exploits Google Docs as Command-and-Control Infrastructure
Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have identified a new surge in ACRStealer, a stealthy infostealer The post ACRStealer Malware Exploits Google Docs as...
View ArticleCVE-2024-39327 (CVSS 9.9): Critical IDPKI Flaw Could Allow Illegitimate...
Eviden, an Atos business, has released a security bulletin addressing multiple vulnerabilities discovered in IDPKI, its Identity and The post CVE-2024-39327 (CVSS 9.9): Critical IDPKI Flaw Could Allow...
View ArticleChina’s Cybersecurity Firms Reveal Alleged NSA (Equation Group) Tactics in...
A newly surfaced Chinese cybersecurity report claims to provide a detailed look into NSA (Equation Group) tactics, techniques, The post China’s Cybersecurity Firms Reveal Alleged NSA (Equation Group)...
View ArticleCVE-2025-0111 & CVE-2025-23209: Palo Alto Firewalls and Craft CMS Under...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical security vulnerabilities to its Known Exploited The post CVE-2025-0111 & CVE-2025-23209: Palo Alto Firewalls...
View ArticleCVE-2025-23115 & CVE-2025-23116: Hackers Can Hijack Ubiquiti UniFi Protect...
Ubiquiti, a leading provider of networking equipment, has issued a critical security advisory concerning multiple vulnerabilities discovered in The post CVE-2025-23115 & CVE-2025-23116: Hackers Can...
View ArticleGoogle Releases PoC for CVE-2025-0110 Command Injection in PAN-OS Firewalls
A Google researcher has disclosed details and a proof-of-concept (PoC) exploit for a vulnerability (CVE-2025-0110) in Palo Alto The post Google Releases PoC for CVE-2025-0110 Command Injection in...
View ArticleAmazon Appstore on Android to Shut Down in 2025: What It Means for Users and...
The Amazon Appstore, introduced by Amazon as an alternative to the Google Play Store, serves as a reliable The post Amazon Appstore on Android to Shut Down in 2025: What It Means for Users and...
View ArticleApple C2 Modem: Next-Gen 5G in the Works?
Apple has recently unveiled the iPhone 16e, marking the debut of its first proprietary 5G modem chip, the The post Apple C2 Modem: Next-Gen 5G in the Works? appeared first on Cybersecurity News.
View ArticleChatGPT Hits 400 Million Weekly Users
In December, 2024, OpenAI revealed that ChatGPT’s weekly active users had surpassed 300 million. This marks a significant The post ChatGPT Hits 400 Million Weekly Users appeared first on Cybersecurity...
View ArticleApple’s Spyware Detection: Only 50% Effective?
The Pegasus spyware, developed by Israeli commercial surveillance firm NSO Group, remains one of the most formidable threats The post Apple’s Spyware Detection: Only 50% Effective? appeared first on...
View ArticleEuropol Cracks Down on European Document Forgery and Smuggling Ring
Europol has announced a successful operation against a significant organized crime group involved in forging official documents and The post Europol Cracks Down on European Document Forgery and...
View ArticlePublicly Disclosed Exploits Put D-Link DIR-823 Users in Danger – No Security...
D-Link has issued a security advisory concerning multiple vulnerabilities affecting the DIR-823 wireless router, revision A1, running firmware The post Publicly Disclosed Exploits Put D-Link DIR-823...
View ArticleBloody Wolf Cybercrime Group Evolves Tactics, Expands Targets
The BI.ZONE Threat Intelligence team has released a new report detailing the evolution of the Bloody Wolf cybercrime The post Bloody Wolf Cybercrime Group Evolves Tactics, Expands Targets appeared...
View ArticleCVE-2024-56000 (CVSS 9.8): Account Takeover Flaw in KLEO WordPress Theme
A critical vulnerability has been discovered in the KLEO WordPress theme, potentially allowing attackers to take over user The post CVE-2024-56000 (CVSS 9.8): Account Takeover Flaw in KLEO WordPress...
View ArticleDDoS Attacks Surge During World Economic Forum (WEF)
The World Economic Forum (WEF) annual meeting in Davos-Klosters, Switzerland, was met with a significant increase in Distributed The post DDoS Attacks Surge During World Economic Forum (WEF) appeared...
View ArticleLummaC2 Malware Masquerading as Total Commander Crack to Infect Windows Users
A recent investigation by the AhnLab Security Intelligence Center (ASEC) has uncovered a malvertising campaign that distributes LummaC2 The post LummaC2 Malware Masquerading as Total Commander Crack to...
View ArticleCVE-2024-37361 (CVSS 9.9): Critical Vulnerability in Pentaho Business...
Hitachi Vantara has issued a security advisory addressing a vulnerability, designated as CVE-2024-37361, in its Pentaho Business Analytics The post CVE-2024-37361 (CVSS 9.9): Critical Vulnerability in...
View ArticleExim Mail Transfer Agent Vulnerable to Remote SQL Injection (CVE-2025-26794),...
A new vulnerability has been discovered in Exim, a widely used mail transfer agent (MTA) for Unix-like systems. The post Exim Mail Transfer Agent Vulnerable to Remote SQL Injection (CVE-2025-26794),...
View ArticleRussia-Linked Threat Actors Exploiting Signal Messenger to Eavesdrop on...
A recent report from Google Threat Intelligence Group (GTIG) has revealed a coordinated effort by multiple Russia-aligned threat The post Russia-Linked Threat Actors Exploiting Signal Messenger to...
View Article