Wednesday, February 12, 2025

Cyber Security News

Google Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

0
Google's Safe Browsing technology now ensures enhanced protection for over 1 billion Chrome users worldwide.Launched in 2005, Safe Browsing is a robust system designed...

Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access

0
A critical vulnerability has been discovered in the Ivanti Cloud Services Application (CSA), potentially allowing attackers to execute remote code and access restricted functionality.Ivanti...

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

0
A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most widely used cryptographic libraries.The flaw allows attackers to exploit a...
Fortinet Zero-Day

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

0
Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass vulnerability (CVE-2025-24472) affecting its FortiOS and FortiProxy products.This...

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

0
Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a wide range of vulnerabilities across its products and services.This...
Entra ID Accounts

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

0
Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks associated with unauthorized hard deletions of user accounts.This...
Single-Bit Fault Injection

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

0
The realm of fault injection attacks has long intrigued researchers and security professionals.Among these, single-bit fault injection, a technique that seeks to manipulate...
SIEM as a Service

Recent News

Apple’s macOS Kernel Vulnerability (CVE-2025-24118) Exposes Users to Privilege Escalation Attacks – PoC Released

0
A critical privilege escalation vulnerability in Apple's macOS kernel has been revealed, posing a significant risk to users.The flaw, identified as CVE-2025-24118, affects multiple versions...

Tor Browser 14.0.6 Released, What’s New!

0
The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the Tor Browser download page and its distribution directory.The latest update introduces critical fixes...

Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network

0
Sensitive credentials from Cisco's internal network and domain infrastructure were reportedly made public due to a significant data breach.According to a Cyber Press Research...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

0
Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has been actively exploited in targeted attacks against iPhone and iPad...

LLM Hijackers Exploit DeepSeek-V3 Model Just One Day After Launch

0
Hackers reportedly gained unauthorized access to the cutting-edge DeepSeek-V3 model within just 24 hours of its high-profile release.DeepSeek-V3, a state-of-the-art large language model (LLM)...
Android & iOS Apps

Malicious Android & iOS Apps Downloaded Over 242,000 Times, Stealing Crypto Recovery Keys

0
A sophisticated malware campaign, dubbed SparkCat, has infiltrated Google Play and Apple’s App Store, marking the first known instance of an optical character recognition...
DeepSeek

Threat Actors Exploiting DeepSeek’s Rise to Fuel Cyber Attacks

0
Amid the surging popularity of DeepSeek, a cutting-edge AI reasoning model from an emerging Chinese startup, cybercriminals have wasted no time leveraging the widespread...
Ransomware

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

0
In a significant shift within the ransomware landscape, global ransom payments plummeted by 35% in 2024, falling from $1.25 billion in 2023 to $813.55...

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

0
Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform, have raised alarm in the cybersecurity community.Security researchers have identified...

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep WebThe deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise.This includes...

Network Penetration Testing Checklist – 2024

Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering open ports, troubleshooting live systems, and services, and grabbing system banners.The pen-testing helps...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain.Threat actors target TeamViewer for...

Web Server Penetration Testing Checklist – 2024

Web server pentesting is performed under three significant categories: identity, analysis, and reporting vulnerabilities such as authentication weaknesses, configuration errors, and protocol relationship vulnerabilities. 1.  "Conduct a...

ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities

ATM Penetration testing, Hackers have found different approaches to hacking into ATM machines.Programmers are not restricting themselves to physical assaults, for example, money/card...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code.Cloud computing is...

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application including buffer overflow, input...

Glossary