Category: CyberSecurityNews

New Jailbreak Techniques Expose DeepSeek LLM Vulnerabilities, Enabling Malicious Exploits
31
Jan
2025

New Jailbreak Techniques Expose DeepSeek LLM Vulnerabilities, Enabling Malicious Exploits

Recent revelations have exposed critical vulnerabilities in DeepSeek’s large language models (LLMs), particularly DeepSeek-R1, through advanced jailbreaking techniques. These exploits,…

Tor Project X Account Hacked to Promote Cryptocurrency Scheme
31
Jan
2025

Tor Project X Account Hacked to Promote Cryptocurrency Scheme

The Tor Project, a renowned organization dedicated to online privacy and anonymity, has fallen victim to a cyberattack. On January…

TeamViewer Windows App Let Attackers Escalate Privileges to System User
30
Jan
2025

TeamViewer Windows App Let Attackers Escalate Privileges to System User

A critical security vulnerability has been identified in TeamViewer Clients for Windows, allowing attackers with local access to escalate their…

Google’s Subdomain 'g.co' Hacked – Hackers Gain Google Account Access Over Phone Call
30
Jan
2025

Google’s Subdomain ‘g.co’ Hacked – Hackers Gain Google Account Access Over Phone Call

Cybercriminals recently exploited Google’s g.co subdomain to carry out a meticulously crafted scam over a vishing call. The incident was…

Threat Actors Exploit Government Website Vulnerabilities For Phishing Attacks
30
Jan
2025

Threat Actors Exploit Government Website Vulnerabilities For Phishing Attacks

Cybercriminals are increasingly exploiting vulnerabilities in government websites to carry out phishing campaigns, leveraging the inherent trust users place in…

Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers
30
Jan
2025

Apple Chips Vulnerability Exposes Credit Cards & Location History to Hackers

Researchers have uncovered two critical vulnerabilities in Apple’s custom silicon chips, dubbed SLAP (Speculative Load Address Prediction) and FLOP (False…

State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks
30
Jan
2025

State-sponsored Actors Abusing Gemini to Fuel Cyber Attacks

The state-sponsored threat actors are increasingly exploiting Google’s AI-powered assistant, Gemini, to enhance their cyber operations.  While generative AI tools…

Windows 11 24H2 Update Breaks Web camera, Audio, & USB
29
Jan
2025

Windows 11 24H2 Update Breaks Web camera, Audio, & USB

The most recent update for Windows 11 24H2, identified as KB5050009, has caused various kinds of technical issues for users,…

Microsoft 365 Down - Worldwide Outage Affects Users & Admins
29
Jan
2025

Microsoft 365 Down – Worldwide Outage Affects Users & Admins

Microsoft 365 users worldwide encountered significant disruptions today as multiple services, including the Microsoft 365 Admin Center, reported degradation or…

PoC Exploit Released for TP-Link Router Web Interface XSS Vulnerability
29
Jan
2025

PoC Exploit Released for TP-Link Router Web Interface XSS Vulnerability

A Cross-Site Scripting (XSS) vulnerability has been identified in the TP-Link Archer A20 v3 router, specifically in firmware version 1.0.6…

Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands
29
Jan
2025

Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands

A significant zero-day vulnerability in Zyxel CPE series devices, identified as CVE-2024-40891, is being actively exploited by attackers. This vulnerability…

DeepSeek R1 Jailbroken to Generate Ransomware Development Scripts
29
Jan
2025

DeepSeek R1 Jailbroken to Generate Ransomware Development Scripts

DeepSeek R1, the latest AI model from China, is making waves in the tech world for its reasoning capabilities. Positioned…