Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.
Cyber Attack
Threat Actors Evade Security Measures to Launch SIM Swap Attacks
SIM swapping fraud continues to pose a significant threat to individuals and financial institutions, despite ongoing efforts by telecom providers and regulatory bodies to...
cyber security
Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques
A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat to Windows users.Developed in the Go programming language, this...
cyber security
macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel
Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS.These occur when software attempts to access memory at address...
CVE/vulnerability
Apache Camel Vulnerability Allows Attackers to Inject Arbitrary Headers
A newly disclosed security vulnerability in Apache Camel, tracked as CVE-2025-27636, has raised alarms across the cybersecurity community.The flaw allows attackers to inject arbitrary headers...
Chrome
Google Warns Chromecast Owners Against Factory Reset
Google has issued a warning to Chromecast owners regarding the potential risks of performing a factory reset on their devices.This advisory comes as users...
AI
AI-Generated Fake GitHub Repositories Steal Login Credentials
A concerning cybersecurity threat has emerged with the discovery of AI-generated fake GitHub repositories designed to distribute malware, including the notorious SmartLoader and Lumma...
AI
AI Becomes a Powerful Weapon for Cybercriminals to Launch Attacks at High Speed
Artificial intelligence (AI) has emerged as a potent tool in the arsenal of cybercriminals, enabling them to execute attacks with unprecedented speed, precision, and...
cyber security
Blind Eagle Hackers Exploit Google Drive, Dropbox & GitHub to Evade Security Measures
In a recent cyber campaign, the notorious threat actor group Blind Eagle, also known as APT-C-36, has been leveraging trusted cloud platforms like Google...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.