Tushar Subhra

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC AutomationPathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in…

1 week ago
Hackers Exploiting Fortinet Zero-day Vulnerability In Wild To Gain Super-Admin PrivilegesHackers Exploiting Fortinet Zero-day Vulnerability In Wild To Gain Super-Admin Privileges

Hackers Exploiting Fortinet Zero-day Vulnerability In Wild To Gain Super-Admin Privileges

A critical zero-day vulnerability in Fortinet's FortiOS and FortiProxy products is being actively exploited by hackers to gain super-admin privileges…

2 months ago
Critical SAP NetWeaver Flaws Let Hackers Gain System AccessCritical SAP NetWeaver Flaws Let Hackers Gain System Access

Critical SAP NetWeaver Flaws Let Hackers Gain System Access

SAP has released its January 2025 Security Patch Day updates, addressing 14 new vulnerabilities, including two critical flaws in SAP…

2 months ago
Microsoft January 2025 Patch Tuesday Comes with Fix for 159 VulnerabilitiesMicrosoft January 2025 Patch Tuesday Comes with Fix for 159 Vulnerabilities

Microsoft January 2025 Patch Tuesday Comes with Fix for 159 Vulnerabilities

Microsoft's January 2025 Patch Tuesday has arrived with a significant security update, addressing a total of 159 vulnerabilities. This marks…

2 months ago
Chrome Security Update – Patch For 16 VulnerabilitiesChrome Security Update – Patch For 16 Vulnerabilities

Chrome Security Update – Patch For 16 Vulnerabilities

Google has released a significant security update for its Chrome browser, addressing 16 vulnerabilities in version 132.0.6834.83/84 for Windows, Mac,…

2 months ago
Zoom Security Update – Patches Multiple Vulnerabilities That Let Attackers Escalate PrivilegesZoom Security Update – Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges

Zoom Security Update – Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges

Zoom Video Communications has released a critical security update addressing multiple vulnerabilities in its suite of applications, including a high-severity…

2 months ago
CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual MachineCRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine

Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as "penetration testing" or "exploiting vulnerabilities." These setups often…

4 months ago
Exploiting Windows MiniFilter to Bypass EDR ProtectionExploiting Windows MiniFilter to Bypass EDR Protection

Exploiting Windows MiniFilter to Bypass EDR Protection

Windows Minifilter drivers are a type of file system filter driver that operates within the Windows operating system to manage…

6 months ago
Researchers Hacked Car EV Chargers To Execute Arbitrary CodeResearchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to execute arbitrary code on the device…

6 months ago
Tropic Trooper Attacks Government Organizations to Steal Sensitive DataTropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since…

6 months ago