Divya

Divya

Researchers Breach Software Supply Chain and Secure $50K Bug BountyResearchers Breach Software Supply Chain and Secure $50K Bug Bounty

Researchers Breach Software Supply Chain and Secure $50K Bug Bounty

A duo of cybersecurity researchers uncovered a critical vulnerability in a software supply chain, landing them an extraordinary $50,500 bug…

2 months ago
Hackers Manipulate Users Into Running PowerShell as Admin to Exploit WindowsHackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

Hackers Manipulate Users Into Running PowerShell as Admin to Exploit Windows

Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored hacking group, Emerald Sleet (also…

2 months ago
Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System AccessWindows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

Windows Driver Zero-Day Vulnerability Let Hackers Remotely Gain System Access

Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows Ancillary Function Driver for WinSock.…

2 months ago
0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community. Identified as CVE-2025-21391, this critical flaw…

2 months ago
Hackers Can Exploit “Wormable” Windows LDAP RCE Vulnerability for Remote AttacksHackers Can Exploit “Wormable” Windows LDAP RCE Vulnerability for Remote Attacks

Hackers Can Exploit “Wormable” Windows LDAP RCE Vulnerability for Remote Attacks

A critical new vulnerability in Microsoft’s Windows Lightweight Directory Access Protocol (LDAP), tagged as CVE-2025-21376, has recently come to light,…

2 months ago
Google Chrome’s Safe Browsing Now Protects 1 Billion Users WorldwideGoogle Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

Google Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

Google's Safe Browsing technology now ensures enhanced protection for over 1 billion Chrome users worldwide. Launched in 2005, Safe Browsing…

2 months ago
Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted AccessCritical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access

Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access

A critical vulnerability has been discovered in the Ivanti Cloud Services Application (CSA), potentially allowing attackers to execute remote code…

2 months ago
Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle AttacksCritical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most widely used cryptographic libraries. The flaw…

2 months ago
OpenAI Developing Its Own Chip to Reduce Reliance on NvidiaOpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in its efforts to reduce its…

2 months ago
New York Bans DeepSeek Over Potential Data RisksNew York Bans DeepSeek Over Potential Data Risks

New York Bans DeepSeek Over Potential Data Risks

 New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on…

2 months ago