Trending Now
Cyber Security News
Weaponized PyPI Package Targets Developers to Steal Source Code
Security researchers at RL have discovered a malicious Python package called "solana-token" on PyPI that is intended to prey on developers working with the...
Microsoft Alerts on AD CS Flaw Enabling Remote Denial-of-Service Attacks
Microsoft has issued a security advisory for a newly identified vulnerability in Active Directory Certificate Services (AD CS), tracked as CVE-2025-29968, which could allow...
Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure
EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent Threats (APTs) targeting critical infrastructure worldwide.
In April 2025, these threat...
Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse
A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have presented sophisticated threat-hunting techniques in a ground-breaking research paper titled...
Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild
Microsoft has disclosed two critical security vulnerabilities in the Windows Common Log File System (CLFS) Driver that are currently being exploited in the wild....
Critical Samsung MagicINFO 9 Server Flaw Allows Arbitrary File Writes
Samsung’s SmartTV and digital signage ecosystem faces renewed cybersecurity scrutiny following the disclosure of a critical path traversal vulnerability (CVE-2025-4632) in its MagicINFO 9...
Windows Ancillary for WinSock 0-Day Vulnerability Actively Exploited to Gain Admin Access
Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows Ancillary Function Driver for WinSock, tracked as CVE-2025-32709.
This use-after-free...
Recent News
Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit targeting Erlang/OTP SSH servers...
Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems
A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated email campaign targeting organizations in Spain, Italy, and Portugal.
This...
Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research.
This operation zeroed in on legacy authentication protocols within...
Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot
The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has been seriously questioned due to persistent cryptographic key management issues...
Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies
The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware attacks during 2024, driven largely by sophisticated exploitation of...
New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
An advanced supply chain attack has targeted the well-known npm package rand-user-agent, which receives about 45,000 downloads every week, in a worrying development for...
DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
Kyle Schutt, a 37-year-old DOGE employee identified in federal payroll records, has had his personal email address and associated passwords exposed in at least...
New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations
A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco Talos, active since at least January 2025.
This campaign exploits...
New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure.
Dubbed Noodlophile Stealer, this previously undocumented infostealer targets unsuspecting...
Most Popular
More
- Acquisition
- Adobe
- Adware
- AI
- Amazon
- Amazon AWS
- AMD
- Android
- Anti Virus
- Antimalware
- Antispoofing
- ANY RUN
- Apache
- Apple
- APT
- Artificial Intelligence
- Avast
- AWS
- Azure
- Backdoor
- Bitcoin
- Bluetooth
- Botnet
- Browser
- Buffer over flow
- Bug Bounty
- Business
- ChatGPT
- Checklist
- Chrome
- Cisco
- CISO
- CISO Advisory
- Cloud
- Cloud Security
- Cloudflare
- Computer Security
- Course
- CPU
- Cross site Scripting
- cryptocurrency
- Cryptocurrency hack
- CVE/vulnerability
- Cyber Advisory
- Cyber AI
- Cyber Attack
- Cyber Crime
- cyber security
- Cyber security Course
- Cyber Security News
- Cyber Security Resources
- Dark Web
- Data Breach
- Data Governance
- DDOS
- Deals
- DeepSeek
- DNS
- Dos Attack
- Drive
- Dropbox
- Education
- Email Security
- Exploit
- Exploitation Tools
- Extratorrents
- Featured
- Firefox
- Firefox News
- Firewall
- Forensics Tools
- game
- GitHub
- Gmail
- Google dorks
- Governance
- GRC
- Hacking Books
- Hacks
- Hardware Hacking
- HBO
- HTML
- HTTP
- IIS
- Incident Response
- Information Gathering
- Information Security Risks
- Infosec- Resources
- Insider Threats
- Intel
- Internet
- iOS
- IoT
- ISO
- IT
- JavaScript
- KALI