Cyber Security News

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft StoreHackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender…

2 days ago
Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDRHackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV)…

2 days ago
RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted IntrusionsRDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated cyber campaign dubbed "Larva-24005," linked to…

2 days ago
New Obfuscation Trick Lets Attackers Evade Antivirus and EDR ToolsNew Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response…

2 days ago
Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on OrganizationsChinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across Southeast Asia. The attackers, who were…

2 days ago
Linux 6.15-rc3 Released With Key Kernel Bug FixesLinux 6.15-rc3 Released With Key Kernel Bug Fixes

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug fixes and minor adjustments to the…

2 days ago
Hackers Abuse Zoom’s Remote Control to Access Users’ ComputersHackers Abuse Zoom’s Remote Control to Access Users’ Computers

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers…

2 days ago
Speedify VPN Vulnerability on macOS Exposes Users to System TakeoverSpeedify VPN Vulnerability on macOS Exposes Users to System Takeover

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the…

2 days ago
Critical PyTorch Vulnerability Allows Hackers to Run Remote CodeCritical PyTorch Vulnerability Allows Hackers to Run Remote Code

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary…

2 days ago
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious CodeASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising…

2 days ago