Divya

Divya

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft StoreHackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender…

1 month ago
Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDRHackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV)…

1 month ago
New Obfuscation Trick Lets Attackers Evade Antivirus and EDR ToolsNew Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response…

1 month ago
Linux 6.15-rc3 Released With Key Kernel Bug FixesLinux 6.15-rc3 Released With Key Kernel Bug Fixes

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug fixes and minor adjustments to the…

1 month ago
Hackers Abuse Zoom’s Remote Control to Access Users’ ComputersHackers Abuse Zoom’s Remote Control to Access Users’ Computers

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers…

1 month ago
Speedify VPN Vulnerability on macOS Exposes Users to System TakeoverSpeedify VPN Vulnerability on macOS Exposes Users to System Takeover

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the…

1 month ago
Critical PyTorch Vulnerability Allows Hackers to Run Remote CodeCritical PyTorch Vulnerability Allows Hackers to Run Remote Code

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary…

1 month ago
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious CodeASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising…

1 month ago
Cybercriminals Exploit Google OAuth Loophole to Evade Gmail SecurityCybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of…

1 month ago
Critical AnythingLLM Vulnerability Exposes Systems to Remote Code ExecutionCritical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution

Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution

A critical security flaw (CVE-2024-13059) in the open-source AI framework AnythingLLM has raised alarms across cybersecurity communities. The vulnerability, discovered in February…

1 month ago