cyber security

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets

Jenkins, the widely-used open-source automation server, issued a high-priority security advisory on March 5, 2025, disclosing four medium-severity vulnerabilities affecting…

2 days ago

YouTube Alerts Creators About Phishing Emails Targeting Login Credentials

YouTube has issued a critical security advisory following a widespread phishing campaign exploiting private video sharing to distribute AI-generated deepfakes…

2 days ago

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks' Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI)…

2 days ago

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed "Phantom Goblin," has been identified by cybersecurity researchers, highlighting the increasing use of social engineering…

2 days ago

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis

GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles. With features like Agent Mode,…

2 days ago

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers

Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses…

2 days ago

AMD Microcode Vulnerability Allows Attackers to Load Malicious Patches

A critical vulnerability in AMD’s Zen 1 through Zen 4 processors allows attackers to bypass microcode signature validation, potentially undermining…

2 days ago

Activating Incognito Mode in RDP to Erase All Traces

The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but it often leaves behind traces of…

2 days ago

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics

Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in…

2 days ago

Peaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data

Peaklight malware has emerged as a significant threat, designed to steal sensitive information from compromised endpoints. This information stealer is…

2 days ago