Category: CyberSecurityNews

Cisco Identity Services RADIUS Process Vulnerability Let Attackers Trigger DoS Condition
22
May
2025

Cisco Identity Services RADIUS Process Vulnerability Let Attackers Trigger DoS Condition

Cisco disclosed a high-severity vulnerability affecting its Identity Services Engine (ISE) that could allow unauthenticated remote attackers to cause a…

How to Enable iOS Lockdown Mode for Enhanced Protection Against Sophisticated Cyber Threats
20
May
2025

How to Enable iOS Lockdown Mode for Enhanced Protection Against Sophisticated Cyber Threats

Apple’s Lockdown Mode offers an extreme security level for users who may be targeted by sophisticated cyberattacks. While most iPhone…

5 Ways to Connect IOCs to Real-World Threats for SOC Teams
20
May
2025

5 Ways to Connect IOCs to Real-World Threats for SOC Teams

When it comes to cyber threats, data alone isn’t enough. Security Operations Center (SOC) teams are flooded with indicators of…

Tor Browser 14.5.2 Released With Bug Fixes & New Capabilities
20
May
2025

Tor Browser 14.5.2 Released With Bug Fixes & New Capabilities

The Tor Project has announced the release of Tor Browser 14.5.2, available since May 18, 2025. This latest version delivers…

ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats
20
May
2025

ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats

A critical security vulnerability in ChatGPT has been discovered that allows attackers to embed malicious SVG (Scalable Vector Graphics) and…

Windows 11 KASLR Bypassed Using Cache Timing Techniques to Obtain The Kernel Base
20
May
2025

Windows 11 KASLR Bypassed Using Cache Timing Techniques to Obtain The Kernel Base

Security researchers have discovered a new technique to bypass Kernel Address Space Layout Randomization (KASLR) in Windows 11, potentially weakening…

Cybercrime-as-a-Service - Countering Accessible Hacking Tools
20
May
2025

Cybercrime-as-a-Service – Countering Accessible Hacking Tools

In today’s digital landscape, cybercrime has undergone a dramatic transformation. No longer limited to skilled hackers, cyberattacks are now available…

ModiLoader Malware Attacking Windows Users to Steal Login Credentials
19
May
2025

ModiLoader Malware Attacking Windows Users to Steal Login Credentials

A sophisticated malware strain called ModiLoader (also known as DBatLoader) has emerged as a significant threat to Windows users, specifically…

glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks
19
May
2025

glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks

A critical vulnerability in the GNU C Library (glibc), potentially exposing millions of Linux systems to local privilege escalation attacks. …

Abusing dMSA with Advanced Active Directory Persistence Techniques 
19
May
2025

Abusing dMSA with Advanced Active Directory Persistence Techniques 

Delegated Managed Service Accounts (dMSAs), introduced in Windows Server 2025, represent Microsoft’s latest innovation in secure service account management.  While…

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution
19
May
2025

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution

A critical vulnerability in Microsoft’s Remote Desktop Gateway (RD Gateway) that could allow attackers to execute malicious code on affected…

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files
18
May
2025

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

A new information-stealing malware dubbed “PupkinStealer” has been identified by cybersecurity researchers, targeting sensitive user data through a straightforward yet…