Wednesday, April 9, 2025

Priya James

Microsoft April 2025 Patch Tuesday: Fixing 121 Vulnerabilities, Including a Critical Zero-Day

Microsoft has rolled out its April 2025 Patch Tuesday update, addressing 121 security vulnerabilities across its software ecosystem.This comprehensive update includes fixes for...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile payment systems such as Apple Pay and Google Wallet....

Shopware Security Plugin Vulnerability Enables SQL Injection Attacks

A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has raised concerns among online shop operators.Although Shopware has addressed...

Attackers Exploit SourceForge Platform to Distribute Malware

A recent malware distribution scheme has been uncovered on SourceForge, the popular software hosting and distribution platform.Cybercriminals have leveraged SourceForge’s subdomain feature to...

New GIFTEDCROOK Stealer Targets Government Organizations to Exfiltrate Sensitive Data

Cybersecurity experts have uncovered an alarming escalation in cyber-espionage operations targeting Ukrainian critical sectors, as outlined in CERT-UA's latest alert, CERT-UA#14303.The campaign, attributed...

Vidar Stealer Uses New Deception Technique to Hijack Browser Cookies and Stored Credentials

Vidar Stealer a notorious information-stealing malware has adopted a deceptive method to disguise itself as Microsoft's BGInfo application.By exploiting a legitimate tool widely used...

Zoom Workplace Apps Vulnerability Enables Malicious Script Injection Through XSS Flaws

A newly disclosed vulnerability in Zoom Workplace Apps (tracked as CVE-2025-27441 and CVE-2025-27442) allows attackers to inject malicious scripts via cross-site scripting (XSS) flaws,...

Fortinet Warns of Multiple Vulnerabilities in FortiAnalyzer, FortiManager, & Other Products

Fortinet has revealed and resolved several vulnerabilities within its range of products, such as FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiVoice, FortiWeb, and FortiSwitch.These weaknesses vary...

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.