Divya

Divya

DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop IssueDrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue

DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue

The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers across the globe. While the exact…

1 month ago
Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code ExecutionAppsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution

Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution

A recent analysis by Rhino Security Labs has uncovered a series of critical vulnerabilities in the Appsmith developer tool, a…

1 month ago
Google Chrome Zero-Day Vulnerability Actively Exploited in the WildGoogle Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild

Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783. This vulnerability…

1 month ago
CISA Highlights Four ICS Flaws Being Actively ExploitedCISA Highlights Four ICS Flaws Being Actively Exploited

CISA Highlights Four ICS Flaws Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS) advisories, drawing attention to potential security…

1 month ago
New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch AvailableNew Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available

A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows 7 and Server 2008 R2 to…

1 month ago
New Specter Insight C2 Tool Fuels ClickFix-Based Hacking CampaignsNew Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns

New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns

A recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework, dubbed Specter Insight C2. This discovery was…

1 month ago
Malicious VS Code Extensions Target Developers with ShibaCoin RansomwareMalicious VS Code Extensions Target Developers with ShibaCoin Ransomware

Malicious VS Code Extensions Target Developers with ShibaCoin Ransomware

Researchers from Reversing Labs have identified two malicious Visual Studio Code (VS Code) extensions that are distributing ransomware to unsuspecting…

1 month ago
Microsoft Introduces Security Copilot Agents with Enhanced AI ProtectionsMicrosoft Introduces Security Copilot Agents with Enhanced AI Protections

Microsoft Introduces Security Copilot Agents with Enhanced AI Protections

Microsoft has launched an expanded version of its Security Copilot platform, now equipped with advanced AI agents. These agents are…

1 month ago
Security Onion 24.10 Released: Everything You Need to KnowSecurity Onion 24.10 Released: Everything You Need to Know

Security Onion 24.10 Released: Everything You Need to Know

Security Onion, a widely used open-source platform for network security monitoring, has recently released Security Onion 2.4.140. This latest update…

1 month ago
Massive Cyberattack Disrupts Ukrainian State Railway’s Online ServicesMassive Cyberattack Disrupts Ukrainian State Railway’s Online Services

Massive Cyberattack Disrupts Ukrainian State Railway’s Online Services

The Ukrainian State Railways, known as Ukrzaliznytsia, has experienced a massive disruption to its online services. The railway company issued…

1 month ago