Priya James
CVE/vulnerability
Dell Update Manager Plugin Flaw Exposes Sensitive Data
Dell Technologies has issued a security advisory (DSA-2025-047) to address a vulnerability in the Dell Update Manager Plugin (UMP) that could expose sensitive data to malicious...
Cyber Security News
DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption
DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app since its January 25 release—has been discovered to transmit sensitive...
CVE/vulnerability
Critical Flaws in HPE Aruba ClearPass Expose Systems to Arbitrary Code Execution
Hewlett Packard Enterprise (HPE) has issued a high-priority security bulletin addressing multiple vulnerabilities in its Aruba ClearPass Policy Manager (CPPM).These flaws, which range from...
AI
Splunk Introduces “DECEIVE” an AI-Powered Honeypot to Track Cyber Threats
Splunk has unveiled DECEIVE (DECeption with Evaluative Integrated Validation Engine), an innovative, AI-augmented honeypot that mimics real-world systems to lure and study cyber attackers.By leveraging advanced...
Cyber Security News
Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely
Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks exploiting publicly disclosed ASP.NET machine keys to compromise ISS web...
cyber security
Abyss Locker Ransomware Attacking Critical Network Devices including ESXi servers
The Abyss Locker ransomware, a relatively new but highly disruptive cyber threat, has been actively targeting critical network devices, including VMware ESXi servers, since...
cyber security
Weaponized SVG Files With Google Drive Links Attacking Gmail, Outlook & Dropbox Users
A new wave of phishing attacks is leveraging Scalable Vector Graphics (SVG) files to bypass traditional email security measures and target users of Gmail,...
Chrome
Flesh Stealer Malware Attacking Chrome, Firefox, and Edge Users to Steal Passwords
A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat in 2025.Designed to extract sensitive data such as passwords,...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.