Kaaviya

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.
Three IXON VPN Client Vulnerabilities Let Attackers Escalate PrivilegesThree IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client that could allow attackers to escalate…

2 days ago
Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI ModelsTwo Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to bypass safety protocols and extract potentially…

4 days ago
New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive SalesNew AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals to promote unverified supplements and treatments.…

4 days ago
Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer MalwareGamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced infostealers targeting global gaming communities. Documented…

4 days ago
The Human Firewall: Strengthening Your Weakest Security LinkThe Human Firewall: Strengthening Your Weakest Security Link

The Human Firewall: Strengthening Your Weakest Security Link

Despite billions spent annually on cybersecurity technology, organizations continue to experience breaches with alarming frequency. The most sophisticated security systems…

6 days ago
New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security MeasuresNew ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH), designed to execute malicious code…

2 weeks ago
PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and AppsPasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

A sophisticated new malware suite targeting macOS, dubbed "PasivRobber," has been discovered by security researchers. Identified on March 13, 2025,…

2 weeks ago
Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript LoaderUnmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Security researchers are analyzing a sophisticated malware delivery mechanism that uses a JScript loader to deploy different payloads based on…

2 weeks ago
ChatGPT Image Generator Abused for Fake Passport ProductionChatGPT Image Generator Abused for Fake Passport Production

ChatGPT Image Generator Abused for Fake Passport Production

OpenAI's ChatGPT image generator has been exploited to create convincing fake passports in mere minutes, highlighting a significant vulnerability in…

2 weeks ago
Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted WebsitesCybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Cybercriminals have launched a sophisticated campaign targeting websites hosted on Amazon Web Services (AWS) EC2 instances. This campaign, observed in…

2 weeks ago