cyber security

Microsoft Windows NTLM File Explorer Vulnerability Exploited in The Wild – PoC ReleasedMicrosoft Windows NTLM File Explorer Vulnerability Exploited in The Wild – PoC Released

Microsoft Windows NTLM File Explorer Vulnerability Exploited in The Wild – PoC Released

A significant vulnerability in Microsoft Windows File Explorer, identified as CVE-2025-24071, has been discovered and is being actively exploited in…

2 weeks ago
41% of Successful Logins Across Websites Involve Compromised Passwords41% of Successful Logins Across Websites Involve Compromised Passwords

41% of Successful Logins Across Websites Involve Compromised Passwords

A recent analysis by Cloudflare reveals a concerning trend in online security: nearly 41% of successful logins across websites involve…

2 weeks ago
Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web ApplicationsHackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea.…

2 weeks ago
Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by AttackersSevere AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

A critical vulnerability has been discovered in AMI's MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various…

2 weeks ago
MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows SandboxMirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics…

2 weeks ago
Sophisticated Cyber Attack Mimics Booking Websites to Unleash LummaStealer MalwareSophisticated Cyber Attack Mimics Booking Websites to Unleash LummaStealer Malware

Sophisticated Cyber Attack Mimics Booking Websites to Unleash LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA prompts…

2 weeks ago
Fake Coinbase Migration Messages Target Users to Steal Wallet CredentialsFake Coinbase Migration Messages Target Users to Steal Wallet Credentials

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to be from Coinbase. The scam attempts…

2 weeks ago
Electromagnetic Side-Channel Analysis of Cryptographically Secured DevicesElectromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices, particularly in the era of the…

2 weeks ago
MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure DeploymentsMirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language models (LLMs) against jailbreak attacks.…

2 weeks ago
New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell CodeNew ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA and Cloudflare Turnstile verifications to deceive…

2 weeks ago