Category: CyberSecurityNews

X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption
18
Aug
2025

X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption

San Francisco, CA – August 12, 2025 — Addressing the growing demand for data privacy in financial workflows, X-VPN has…

New Ghost-tapping Attacks Steal Customers' Cards Linked to Services Like Apple Pay and Google Pay
18
Aug
2025

New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay

A sophisticated new cybercriminal technique known as “ghost-tapping” has emerged as a significant threat to contactless payment systems, enabling Chinese-speaking…

Bragg Confirms Cyber Attack - Hackers Accessed Internal IT Systems
18
Aug
2025

Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems

Bragg Gaming Group has confirmed a significant cybersecurity incident that compromised the company’s internal IT infrastructure early Saturday morning, August…

Linux Kernel netfilter Vulnerability Let Attackers Escalate Privileges
18
Aug
2025

Linux Kernel netfilter Vulnerability Let Attackers Escalate Privileges

A critical vulnerability in the Linux kernel’s netfilter ipset subsystem has been discovered that allows local attackers to escalate privileges…

1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities
18
Aug
2025

1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities

Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers are vulnerable to two newly disclosed zero-day…

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration
18
Aug
2025

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration

The PostgreSQL Global Development Group has issued emergency security updates across all supported versions to address three critical vulnerabilities that…

What is Use-After-Free Vulnerability? - Impact and Mitigation
18
Aug
2025

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications…

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute…

Threat Actor Allegedly Claiming Access to 15.8 Million PayPal Email and Passwords in Plaintext
18
Aug
2025

Threat Actor Allegedly Claiming Access to 15.8 Million PayPal Email and Passwords in Plaintext

A threat actor operating under the alias “Chucky_BF” has posted a concerning advertisement on a well-known cybercrime forum, claiming to…

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM
18
Aug
2025

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM

Workday, a leading provider of enterprise cloud applications for finance and human resources, has confirmed it was the target of…

Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time
18
Aug
2025

Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time

A cybersecurity researcher has discovered that hundreds of publicly accessible TeslaMate installations are exposing sensitive Tesla vehicle data without authentication,…

North Korean Hackers Stealthy Linux Malware Leaked Online
18
Aug
2025

North Korean Hackers Stealthy Linux Malware Leaked Online

In a significant breach of both cybersecurity defenses and secrecy, a trove of sensitive hacking tools and technical documentation, believed…