Cyber Security News
Rhadamanthys Infostealer Uses Microsoft Management Console to Spread Malware
Cybersecurity experts have raised alarms about the Rhadamanthys Infostealer, a sophisticated malware now being distributed through Microsoft Management Console (MMC) files with the MSC...
Cyber Attack
ShadowPad Malware Upgraded to Deliver Ransomware in Targeted Attacks
Security researchers have uncovered a significant evolution in the ShadowPad malware family, which is now being used to deploy ransomware in highly targeted attacks....
cyber security
Phishing Attack Exploit CEOs, CTOs, and Top Decision-Makers
A recent phishing campaign conducted by cybersecurity firm Hackmosphere has revealed alarming vulnerabilities among top decision-makers, including CEOs and CTOs.The study underscores how...
Browser
Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates
Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the threat actor group SmartApeSG, also known as ZPHP or HANEYMANEY.This campaign exploits...
cyber security
NVIDIA CUDA Toolkit Vulnerabilities Expose Systems to Potential DoS Attacks
Cybersecurity researchers at Palo Alto Networks' Unit 42 disclosed nine vulnerabilities in NVIDIA's Compute Unified Device Architecture (CUDA) Toolkit, specifically in the cuobjdump and...
CVE/vulnerability
Fedora Linux Kernel Flaw Exposed Sensitive Data to Attackers
A newly discovered vulnerability in the Fedora Linux kernel, identified as CVE-2025-1272, has raised alarm bells in the open-source community.The flaw, stemming from Secure...
CVE/vulnerability
IBM OpenPages Flaw Exposed Authentication Credentials to Attackers
IBM recently disclosed multiple vulnerabilities in its OpenPages platform, a tool widely used for governance, risk, and compliance management.These vulnerabilities, if exploited, could allow...
Cyber Security News
AWS Key Hunter: An Automated Solution for Exposed Key Detection
AWS Key Hunter, a cutting-edge automated solution designed to identify exposed AWS keys in GitHub repositories.This powerful tool combines real-time monitoring, advanced scanning capabilities,...