Category: CyberSecurityNews

Tor Browser 14.0.6 Released, What’s New!
10
Feb
2025

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially launched Tor Browser 14.0.6, addressing a critical crash issue affecting users on older macOS systems….

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources
10
Feb
2025

Critical Zimbra Vulnerabilities Let Attackers Unauthorized Access to Internal Resources

Zimbra Collaboration, a popular open-source email and collaboration software, was recently discovered to include critical vulnerabilities that pose serious risks…

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs
10
Feb
2025

Massive Brute Force Attack Targets VPN and Firewall Logins Using 2.8 Million IPs

A global brute force attack campaign leveraging 2.8 million IP addresses actively targets edge security devices, including VPNs, firewalls, and…

Hackers Exploiting Google Tag Manager To Steal Credit Card From eCommerce Sites
10
Feb
2025

Hackers Exploiting Google Tag Manager To Steal Credit Card From eCommerce Sites

Hackers have been exploiting Google Tag Manager (GTM) to steal sensitive credit card information from eCommerce sites, particularly those built…

Linux Kernel 6.14 Released - What's New With rc2!
10
Feb
2025

Linux Kernel 6.14 Released – What’s New With rc2!

Linus Torvalds announced the release of Linux Kernel 6.14-rc2, the second release candidate in the 6.14 series. The release follows…

UK Govt Orders Apple to Create Backdoor Access for iCloud Backups
07
Feb
2025

UK Govt Orders Apple to Create Backdoor Access for iCloud Backups

The UK government has reportedly issued a secret order to Apple, compelling the tech giant to create a backdoor for…

New Attack Abusing Kerberos Delegation in Active Directory Networks
07
Feb
2025

New Attack Abusing Kerberos Delegation in Active Directory Networks

A new attack vector exploiting vulnerabilities in Kerberos delegation within Active Directory (AD) networks has been uncovered, posing significant risks…

Hackers Exploited 3,000+ ASP.NET Keys To Execute Code on IIS Server Remotely
07
Feb
2025

Hackers Exploited 3,000+ ASP.NET Keys To Execute Code on IIS Server Remotely

A recent security incident has revealed that over 3,000 publicly disclosed ASP.NET machine keys were exploited by hackers to execute…

Splunk Unveils a New AI Based Honeypot “DECEIVE” to Log Attacker Activities
07
Feb
2025

Splunk Unveils a New AI Based Honeypot “DECEIVE” to Log Attacker Activities

Splunk, a leader in data analytics and cybersecurity solutions, has introduced a groundbreaking proof-of-concept honeypot system named DECEIVE (DECeption with…

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums
07
Feb
2025

Beware of Nova Stealer Malware Sold for $50 on Hacking Forums

A recent cybersecurity threat has emerged in the form of the Nova Stealer malware, a fork of the popular SnakeLogger…

WhatsApp Zero-Click Paragon Spyware Terminates Contract with Italy
07
Feb
2025

WhatsApp Zero-Click Paragon Spyware Terminates Contract with Italy

Israeli spyware company Paragon Solutions has terminated its contract with Italy following allegations that its military-grade surveillance software, Graphite, was…

Hackers Exploiting ScreenConnect RMM Tool to Establish Persistence
07
Feb
2025

Hackers Exploiting ScreenConnect RMM Tool to Establish Persistence

Threat actors have been leveraging the legitimate Remote Monitoring and Management (RMM) tool, ScreenConnect, to establish persistence in their cyberattacks….