Zyxel CPE Zero-Day (CVE-2024-40891) Exploited in the Wild

2 weeks ago

Security researchers have raised alarms about active exploitation attempts targeting a newly discovered zero-day command injection vulnerability in Zyxel CPE…

Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware

2 weeks ago

Google’s Threat Intelligence Group (GTIG) in collaboration with Mandiant has revealed critical insights into ScatterBrain, a sophisticated obfuscation tool utilized…

FleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

2 weeks ago

A newly identified strain of information-stealing malware, FleshStealer, is making headlines in 2025 due to its advanced evasion techniques and…

Windows 11 24H2 Update Bug: Users Report Disruptions in Web Camera and USB Devices

2 weeks ago

Windows 11 KB5050009 for version 24H2 has sparked widespread frustrations among users due to a slew of compatibility and functionality…

TP-Link Router Web Interface XSS Vulnerability – PoC Exploit Released

2 weeks ago

A recently discovered Cross-site Scripting (XSS) vulnerability, CVE-2024-57514, affecting the TP-Link Archer A20 v3 Router has raised security concerns among…

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

2 weeks ago

A recent security vulnerability in a widely used airline integration service has exposed millions of users to account takeovers, raising…

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

2 weeks ago

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system, eventually gaining control over 3,000 subsidiary…

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

2 weeks ago

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been disclosed, with a proof-of-concept (PoC) exploit…

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

2 weeks ago

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a previously undocumented backdoor known as "TorNet."…

Hackers Could Bypassing EDR Using Windows Symbolic Links to Disable Service Executables

2 weeks ago

A groundbreaking technique for exploiting Windows systems has emerged, combining the "Bring Your Own Vulnerable Driver" (BYOVD) approach with the…