Category: CyberSecurityNews

Michael Trites Joins Aembit as Senior Vice President of Global Sales
05
Feb
2025

Michael Trites Joins Aembit as Senior Vice President of Global Sales

Aembit, the non-human identity and access management (IAM) company, today announced that Michael Trites has joined the company as senior…

Hackers Using AI Agents To Validate Stolen Credit Cards
05
Feb
2025

Hackers Using AI Agents To Validate Stolen Credit Cards

Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial…

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog
05
Feb
2025

CISA Adds Actively Exploited Linux Kernel Vulnerability to Known Exploited Vuln Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities…

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code
05
Feb
2025

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code

IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software.  These vulnerabilities, if…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A new report from FortiGuard Labs reveals that Chinese hackers are actively targeting Linux devices with a sophisticated SSH backdoor…

Threat Actors Exploiting DeepSeek's Rise To Fuel Cyber Attacks
05
Feb
2025

Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks

The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning…

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30
05
Feb
2025

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30

In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just…

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
05
Feb
2025

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access

The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik…

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
05
Feb
2025

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access

A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code
05
Feb
2025

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code

The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux….

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin
05
Feb
2025

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin

AMD has disclosed a high-severity vulnerability (CVE-2024-56161) in its Secure Encrypted Virtualization (SEV) technology, which could allow attackers with administrative…