Divya

Divya

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft StoreHackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender…

3 weeks ago
Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDRHackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV)…

3 weeks ago
New Obfuscation Trick Lets Attackers Evade Antivirus and EDR ToolsNew Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response…

3 weeks ago
Linux 6.15-rc3 Released With Key Kernel Bug FixesLinux 6.15-rc3 Released With Key Kernel Bug Fixes

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug fixes and minor adjustments to the…

3 weeks ago
Hackers Abuse Zoom’s Remote Control to Access Users’ ComputersHackers Abuse Zoom’s Remote Control to Access Users’ Computers

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers…

3 weeks ago
Speedify VPN Vulnerability on macOS Exposes Users to System TakeoverSpeedify VPN Vulnerability on macOS Exposes Users to System Takeover

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the…

3 weeks ago
Critical PyTorch Vulnerability Allows Hackers to Run Remote CodeCritical PyTorch Vulnerability Allows Hackers to Run Remote Code

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary…

3 weeks ago
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious CodeASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising…

3 weeks ago
Cybercriminals Exploit Google OAuth Loophole to Evade Gmail SecurityCybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of…

3 weeks ago
Critical AnythingLLM Vulnerability Exposes Systems to Remote Code ExecutionCritical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution

Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution

A critical security flaw (CVE-2024-13059) in the open-source AI framework AnythingLLM has raised alarms across cybersecurity communities. The vulnerability, discovered in February…

4 weeks ago