Author: Cybernoz

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code
18
Mar
2025

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems’ ESP32 devices, specifically affecting the BluFi module within the ESP-IDF…

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution
18
Mar
2025

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and Event Management (SIEM) platform. This…

Kentico Xperience CMS Vulnerability Enables Remote Code Execution
18
Mar
2025

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who…

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection
18
Mar
2025

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection

A recent discovery by Palo Alto Networks’ Unit 42 has shed light on sophisticated malware targeting Internet Information Services (IIS)…

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers
18
Mar
2025

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers

A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses seemingly harmless JPG files to…

Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
18
Mar
2025

Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week

In its latest research report, cybersecurity firm Veriti has spotted active exploitation of a vulnerability within OpenAI’s ChatGPT infrastructure. Their…

Lion reorganises tech and cyber leadership
18
Mar
2025

Lion reorganises tech and cyber leadership – Training & Development

Beverage maker Lion has consolidated its IT and cyber leadership into a single role, now held by Ram Kalyanasundaram. Ram…

BleepingComputer.com logo
18
Mar
2025

Page not found

Page not found Unfortunately the page that you requested does not exist. Don’t worry, though, we have some great suggestions…

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware
17
Mar
2025

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware. This…

"Sophisticated" StilachiRAT Exploits Chrome for Crypto Wallets and Credentials
17
Mar
2025

“Sophisticated” StilachiRAT Exploits Chrome for Crypto Wallets and Credentials

Microsoft’s Incident Response team has spotted a “sophisticated” new remote access trojan (RAT) dubbed StilachiRAT compromising targeted systems, stealing data…

Quantum computing, AI stocks rise as Nvidia kicks off annual conference
17
Mar
2025

Quantum computing, AI stocks rise as Nvidia kicks off annual conference – Hardware

Shares of quantum computing and artificial intelligence companies rose as investors hoped that Nvidia would blow some life back into…

Threat actors rapidly exploit new Apache Tomcat flaw following PoC release
17
Mar
2025

Threat actors rapidly exploit new Apache Tomcat flaw following PoC release

Pierluigi Paganini March 17, 2025 Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure Threat actors began exploiting…