Balaji

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in…

2 weeks ago
CISA Extend Funding to MITRE to Keep CVE Program RunningCISA Extend Funding to MITRE to Keep CVE Program Running

CISA Extend Funding to MITRE to Keep CVE Program Running

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the…

2 weeks ago
Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account ControlWindows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection. These…

2 weeks ago
Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack SystemsWindows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025,…

2 weeks ago
The Future of Authentication: Moving Beyond PasswordsThe Future of Authentication: Moving Beyond Passwords

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their reign is coming to an end.…

2 weeks ago
Top 10 Best Zero Trust Solutions 2025Top 10 Best Zero Trust Solutions 2025

Top 10 Best Zero Trust Solutions 2025

Zero Trust Solutions is a modern cybersecurity framework built on the principle of "never trust, always verify." Unlike traditional perimeter-based…

2 weeks ago
Cybersecurity for Startups – What Early-Stage CISOs Must PrioritizeCybersecurity for Startups – What Early-Stage CISOs Must Prioritize

Cybersecurity for Startups – What Early-Stage CISOs Must Prioritize

Early-stage startups face unique cybersecurity challenges that established enterprises have already addressed through years of investment and experience. For Chief…

2 weeks ago
EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image DataEU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR), enacted in 2018, remains a cornerstone…

2 weeks ago
Kaspersky Shares 12 Essential Tips for Messaging App Security and PrivacyKaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and WeChat dominate personal and professional communication,…

2 weeks ago
The State of AI Malware and Defenses Against ItThe State of AI Malware and Defenses Against It

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and…

3 weeks ago