Thursday, March 20, 2025

BALAGANESH

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation

Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility.These vulnerabilities, identified as CVE-2024-20439 and...

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution

IBM has recently issued a critical security warning regarding vulnerabilities in its AIX operating system that could allow remote attackers to execute arbitrary commands.The...

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products.These vulnerabilities pose significant risks to users, including potential...

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of...

Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange

The Babuk ransomware group has recently claimed responsibility for a sophisticated cyberattack on Orange, a leading global telecommunications company.According to an exclusive interview...

CISA Alerts on Edimax IP Camera OS Command Injection Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability found in Edimax IC-7100 IP cameras.The alert centers...

Chinese “Salt Typhoon” Hackers Exploit Exchange Vulnerabilities to Target Organizations

The Chinese Advanced Persistent Threat (APT) group known as Salt Typhoon, also referred to as FamousSparrow, GhostEmperor, Earth Estries, and UNC2286, has been actively...

CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known...

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.