Author: Cybernoz

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass
25
Feb
2025

Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass

A newly disclosed vulnerability in the GRUB2 bootloader’s read command (CVE-2025-0690) has raised concerns about potential Secure Boot bypasses and…

Jane Devry
25
Feb
2025

Overcoming Critical AI Security Risks Uncovered in DeepSeek-R1

DeepSeek has taken the AI world by storm, surpassing ChatGPT as the most downloaded smartphone app and gaining rapid adoption…

GitVenom Malware
25
Feb
2025

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and…

Qualcomm & Google Tied Up to Offer Eight Years of Software and Security Updates
25
Feb
2025

Qualcomm & Google Tied Up to Offer Eight Years of Software and Security Updates

In a transformative move for smartphone longevity, Qualcomm Technologies, Inc., and Google have announced a collaboration to enable eight years…

Legit context turns raw data into actionable insights
25
Feb
2025

Legit context turns raw data into actionable insights

By providing full context around both the application and the development environment, Legit’s ASPM platform empowers CISOs and their team…

Truesight.sys Driver Variants
25
Feb
2025

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

Feb 25, 2025Ravie LakshmananWindows Security / Vulnerability A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated…

Council of the European Union
25
Feb
2025

Council Of The European Union Sanctions On Russia

The Council of the European Union took decisive action to impose a new set of sanctions on Russia, with the…

‘OpenAI’ Job Scam Targeted International Workers Through Telegram
25
Feb
2025

‘OpenAI’ Job Scam Targeted International Workers Through Telegram

“Regrettably, I found no available source online to know more about this organization except for those registrations,” wrote the complainant….

5 Active Malware Campaigns in Q1 2025
25
Feb
2025

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns…

Reflecting on three years of cyber warfare in Ukraine
25
Feb
2025

Reflecting on three years of cyber warfare in Ukraine

As we mark the third anniversary of the Russian invasion of Ukraine in February 2022, it is essential to reflect…

U.S. CISA adds Adobe ColdFusion and Oracle Agile PLM flaws to its Known Exploited Vulnerabilities catalog
25
Feb
2025

U.S. CISA adds Adobe ColdFusion and Oracle Agile PLM flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Adobe ColdFusion and Oracle Agile PLM flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 25, 2025…

Orange telco provider confirms breach after hacker leaks data
25
Feb
2025

Orange Group confirms breach after hacker leaks company documents

A hacker claims to have stolen thousands of internal documents with user records and employee data after breaching the systems…