Category: CyberSecurityNews

Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant
14
May
2025

\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant

Logicube’s Falcon-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant and Endorsed for Law Enforcement Forensic Use Kindred…

Entro Security and Wiz Announce Integration for Improved Non-Human Identity & Cloud Security
14
May
2025

Entro Security and Wiz Announce Integration for Improved Non-Human Identity & Cloud Security

Entro Security, a pioneer in Non-Human Identity (NHI) and Secrets Security, and Wiz, a leading cloud security platform, have announced…

Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code
14
May
2025

Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code

Adobe has released critical security updates for Photoshop on both Windows and macOS platforms after discovering multiple severe vulnerabilities that…

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches
14
May
2025

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches

The race between cybersecurity professionals and malicious hackers has reached alarming speeds in 2025, with new data revealing that more…

Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems
14
May
2025

Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems

The digital frontlines of modern conflict have expanded dramatically in 2025, with state-sponsored hackers from China, Russia, North Korea, and…

Top 5 WMIC Commands Used By Malware 
14
May
2025

Top 5 WMIC Commands Used By Malware 

Malware doesn’t need fancy tools to be dangerous. Sometimes, all it takes is WMIC, a quiet, native utility that’s still…

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code
14
May
2025

Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code

Adobe has released a critical security update for its popular design software Illustrator, addressing a severe vulnerability that could allow…

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character
14
May
2025

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character

A new attack vector where cybercriminals are weaponizing Google Calendar invites to deliver malware, using a sophisticated obfuscation technique involving…

Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File
14
May
2025

Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File

Samsung has disclosed a critical security vulnerability (CVE-2025-4632) affecting its MagicINFO 9 Server platform, a widely deployed content management system…

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse
14
May
2025

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Cybersecurity experts have unveiled sophisticated techniques to identify potential abuse of Azure Managed Identities (MIs), addressing a critical but often…

Windows Remote Desktop Gateway Vulnerability Let Attackers Trigger Dos Condition
14
May
2025

Windows Remote Desktop Gateway Vulnerability Let Attackers Trigger Dos Condition

Microsoft Security Response Center (MSRC) has released important security updates to address a critical vulnerability in Windows Remote Desktop Gateway…

Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code
14
May
2025

Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code

Microsoft addressed a significant security flaw in its Outlook email client during the May 2025 Patch Tuesday, releasing fixes for…