VMware Aria Operations Vulnerabilities Allow Attackers to Perform Admin-Level Actions

2 weeks ago

VMware has released a critical security advisory, VMSA-2025-0003, addressing multiple vulnerabilities in VMware Aria Operations for Logs, VMware Aria Operations, and…

Malware Discovered in Healthcare Patient Monitors, Traced to Chinese IP Address

2 weeks ago

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding multiple vulnerabilities identified in Contec Health's CMS8000…

Jailbreaking DeepSeek: Researchers Reveal Three New Methods to Override LLM Safety

2 weeks ago

Researchers at Palo Alto Networks' Unit 42 have revealed a troubling surge in large language model (LLM) security risks, citing…

Phorpiex Botnet Distributes LockBit Ransomware Through Compromised Websites

2 weeks ago

Cybereason Security Services has published a comprehensive threat analysis highlighting the resurgence of the Phorpiex botnet, which is being leveraged…

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control

2 weeks ago

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link's DSL-3788 routers, specifically hardware revisions Ax/Bx running…

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

2 weeks ago

Authorities have delivered a major blow to the cybercrime world by dismantling two of the largest hacking forums globally—Cracked.io and…

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

2 weeks ago

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded services, clearer guidelines, and bounty rewards…

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

2 weeks ago

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware attack on its IT infrastructure. The…

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

2 weeks ago

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed by cybersecurity researchers. Introduced by…

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

2 weeks ago

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer," which exploits fake wedding invitations…