Category: CyberSecurityNews

What is Use-After-Free Vulnerability? - Impact and Mitigation
18
Aug
2025

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications…

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute…

Threat Actor Allegedly Claiming Access to 15.8 Million PayPal Email and Passwords in Plaintext
18
Aug
2025

Threat Actor Allegedly Claiming Access to 15.8 Million PayPal Email and Passwords in Plaintext

A threat actor operating under the alias “Chucky_BF” has posted a concerning advertisement on a well-known cybercrime forum, claiming to…

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM
18
Aug
2025

HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM

Workday, a leading provider of enterprise cloud applications for finance and human resources, has confirmed it was the target of…

Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time
18
Aug
2025

Hundreds of TeslaMate Installations Leaking Sensitive Vehicle Data in Real Time

A cybersecurity researcher has discovered that hundreds of publicly accessible TeslaMate installations are exposing sensitive Tesla vehicle data without authentication,…

North Korean Hackers Stealthy Linux Malware Leaked Online
18
Aug
2025

North Korean Hackers Stealthy Linux Malware Leaked Online

In a significant breach of both cybersecurity defenses and secrecy, a trove of sensitive hacking tools and technical documentation, believed…

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption
18
Aug
2025

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption

A significant security update rolled out by Microsoft with the Windows 11 24H2 (KB5063878) release is causing widespread issues for…

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites
18
Aug
2025

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites

As families across the country prepare for the return to school, cybercriminals are exploiting the seasonal rush with a fresh…

Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks
17
Aug
2025

Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks

In the week of August 11-17, 2025, the cybersecurity landscape was marked by critical updates from major vendors and a…

CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure
17
Aug
2025

CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure

CISA in collaboration with international partners, has released comprehensive guidance, titled “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners…

New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
17
Aug
2025

New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD

A newly discovered zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) solution allows attackers to bypass security measures, execute…

17
Aug
2025

New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD

A newly discovered zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) solution allows attackers to bypass security measures, execute…