2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

6 hours ago
Balaji

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in…

CISA Extend Funding to MITRE to Keep CVE Program RunningCISA Extend Funding to MITRE to Keep CVE Program Running

CISA Extend Funding to MITRE to Keep CVE Program Running

8 hours ago

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the…

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account ControlWindows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

8 hours ago

New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection. These…

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack SystemsWindows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

10 hours ago

A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025,…

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login CredentialsServer-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

11 hours ago

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises. This strategic shift…

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing MalwareBeware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

11 hours ago

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations…

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser UpdatesInterlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

11 hours ago

The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques. Not falling under…

Researchers Expose Medusa Ransomware Group’s Onion SiteResearchers Expose Medusa Ransomware Group’s Onion Site

Researchers Expose Medusa Ransomware Group’s Onion Site

11 hours ago

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker. Known for targeting…

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity CrisisCISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

11 hours ago

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding…

Hackers Target Investors Through Fraud Networks to Steal Financial DataHackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers Target Investors Through Fraud Networks to Steal Financial Data

12 hours ago

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data. Utilizing digital platforms, encrypted messaging apps,…