Category: CyberSecurityNews

Linux Kernel Patching: Preventing Exploits in 2025
16
May
2025

Linux Kernel Patching: Preventing Exploits in 2025

As the Linux kernel continues to power everything from cloud infrastructure to embedded devices, its security remains critical. In 2025,…

SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack
16
May
2025

SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack

A coordinated phishing campaign targeting Kuwait’s critical sectors has been exposed through a distinctive operational security lapse: the consistent reuse…

SonicWall SMA1000 Vulnerability Let Attackers to Exploit Encoded URLs To Gain Internal Systems Access Remotely
16
May
2025

SonicWall SMA1000 Vulnerability Let Attackers to Exploit Encoded URLs To Gain Internal Systems Access Remotely

SonicWall has issued a high-priority security advisory (SNWLID-2025-0010) revealing a critical Server-Side Request Forgery (SSRF) vulnerability in its SMA1000 Appliance…

Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked - Pwn2Own Day 1
16
May
2025

Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked – Pwn2Own Day 1

The first day of Pwn2Own Berlin 2025 wrapped up with a bang, as hackers showcased 11 exploit attempts, including AI-targeted…

New HTTPBot Botnet Expanding Aggressively to Attack Windows Machines
15
May
2025

New HTTPBot Botnet Expanding Aggressively to Attack Windows Machines

A new botnet family named HTTPBot has emerged as a critical threat to the Windows ecosystem, leveraging sophisticated HTTP-based distributed…

Healthcare Cyber Attacks - 276 Million Patient Records were Compromised In 2024
15
May
2025

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

In 2024, the healthcare sector faced an unprecedented wave of cyber attacks, with 276 million patient records exposed globally. Among…

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability
15
May
2025

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability

A critical vulnerability in Microsoft’s BitLocker full disk encryption, demonstrating that it can be bypassed in under five minutes using…

New Weaponized PyPI Package Attacking Developers to Steal Source Code
15
May
2025

New Weaponized PyPI Package Attacking Developers to Steal Source Code

A newly discovered malicious Python package, solana-token, has been weaponized to steal source code and sensitive secrets from developers working…

Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized
15
May
2025

Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized

Europol announced on May 14 that law enforcement agencies have dismantled a sophisticated criminal parallel banking network operating across multiple…

Hardening Windows Servers - Top Strategies to Prevent Exploits in 2025
15
May
2025

Hardening Windows Servers – Top Strategies to Prevent Exploits in 2025

As organizations face sophisticated cyber threats in 2025, securing Windows Server environments has become more critical than ever. With the…

Google Chrome 0-Day Vulnerability Exploited in the Wild
15
May
2025

Google Chrome 0-Day Vulnerability Exploited in the Wild

Google has released an urgent security update for Chrome to patch a critical vulnerability that hackers are actively exploiting in…

Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies
15
May
2025

Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies

As digital threats grow in sophistication, the cybersecurity sector has ignited a funding frenzy, with startups raising $1.7 billion in April…