Friday, April 11, 2025

Cyber Security News

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

0
A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to bypass microcode signature verification and execute malicious code.Designated as CVE-2024-36347 (CVSS score:...

Researchers Exploit Windows Defender with XOR and System Calls

0
A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms using advanced techniques involving XOR encryption and direct system calls.This...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

0
A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across the cybersecurity industry.The flaw, which affects several Ivanti products, allows...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

0
A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network security.The vulnerability, stemming from the reuse of SSH host keys,...

Microsoft Issues Urgent Patch to Fix Office Update Crash

0
Microsoft has released an urgent patch for Office 2016 to address a critical issue causing key applications like Word, Excel, and Outlook to crash...
GammaSteel Malware

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

0
The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been observed targeting a Western country's military mission located within...
ViperSoftX Malware

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

0
AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware...
SIEM as a Service

Recent News

Russian-Speaking Cybercrime Forums

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

0
Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal underground, revealing the intricate web of tools, techniques, and...

CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an actively exploited vulnerability in CrushFTP, a popular file transfer server...
State Bar of Texas

State Bar of Texas Confirms Data Breach, Begins Notifying Affected Consumers

0
The State Bar of Texas has confirmed a data breach following the detection of unauthorized activity on its network earlier this year.According to...

CISA Alerts on Actively Exploited Linux Kernel Out-of-Bounds & Read Flaw

0
The Cybersecurity and Infrastructure Security Agency (CISA) has issued alerts regarding two actively exploited vulnerabilities in the Linux Kernel.The flaws, tagged as CVE-2024-53197 and...
Free SOC Tools

Top 20 Best Open-Source SOC Tools in 2025

0
As cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to detect, analyze, and respond to incidents effectively.Open-source SOC tools...

PoC Exploit Reveals SSH Key Exposure via Yelp Vulnerability on Ubuntu

0
Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp that could expose sensitive system files including SSH private keys.The...
Medialand

Threat Actor Leaks Data from Major Bulletproof Hosting Provider Medialand

0
A threat actor disclosed internal data from Medialand, a prominent bulletproof hosting (BPH) provider long associated with Yalishanda, a cybercriminal organization tracked as LARVA-34.The...

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

0
A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to force firewalls into repeated reboots using maliciously crafted packets.Tracked...
Privilege Escalation Attacks

50,000+ WordPress Sites Vulnerable to Privilege Escalation Attacks

0
In a recent cybersecurity development, over 50,000 WordPress websites using the Uncanny Automator plugin have been identified as vulnerable to a critical privilege escalation...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to bypass microcode signature verification and execute malicious code.Designated as CVE-2024-36347 (CVSS score:...

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms using advanced techniques involving XOR encryption and direct system calls.This...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across the cybersecurity industry.The flaw, which affects several Ivanti products, allows...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network security.The vulnerability, stemming from the reuse of SSH host keys,...

Microsoft Issues Urgent Patch to Fix Office Update Crash

Microsoft has released an urgent patch for Office 2016 to address a critical issue causing key applications like Word, Excel, and Outlook to crash...

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been observed targeting a Western country's military mission located within...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware...

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and easy access to large...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over 100,000 websites at risk.The issue, discovered by security researcher...

Glossary