Category: CyberSecurityNews

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse
14
May
2025

Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

Cybersecurity experts have unveiled sophisticated techniques to identify potential abuse of Azure Managed Identities (MIs), addressing a critical but often…

Windows Remote Desktop Gateway Vulnerability Let Attackers Trigger Dos Condition
14
May
2025

Windows Remote Desktop Gateway Vulnerability Let Attackers Trigger Dos Condition

Microsoft Security Response Center (MSRC) has released important security updates to address a critical vulnerability in Windows Remote Desktop Gateway…

Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code
14
May
2025

Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code

Microsoft addressed a significant security flaw in its Outlook email client during the May 2025 Patch Tuesday, releasing fixes for…

Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks
14
May
2025

Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks

The rapid adoption of electric vehicles (EVs) has introduced unprecedented cybersecurity risks. Hackers exploit vulnerabilities in charging infrastructure, vehicle software,…

Chinese Hackers Exploit SAP NetWeaver 0-Day Vulnerability To Attack Critical Infrastructures
14
May
2025

Chinese Hackers Exploit SAP NetWeaver 0-Day Vulnerability To Attack Critical Infrastructures

In April 2025, security researchers identified a sophisticated campaign targeting critical infrastructure networks worldwide through a previously unknown vulnerability in…

Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files
14
May
2025

Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files

Google Threat Intelligence has launched a new blog series aimed at empowering security professionals with advanced threat hunting techniques, kicking…

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6rvOXAonIOi-3fd5NxReDgvDZ3dMvmhPjBdIyIWZlNFqvIM-6vXPW1xWnm7KOxqoxqAOXd5D05wfbyrlDPMmyPPe2oAKmdNIx4OeOjiLOyu3tvZqALupt3F29wk53efoKkFN3c9tW9-lQ65_3ezSLOJ-fdOxgdvF1aleKFtiW881xC3_sINBl19WxsF_2/s16000/Microsoft%20Defender%20Vulnerability.webp
14
May
2025

Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges

A newly disclosed security flaw in Microsoft Defender for Endpoint could allow attackers with local access to elevate their privileges…

Microsoft Warns of AD CS Vulnerability Let Attacker Deny Service Over a Network
14
May
2025

Microsoft Warns of AD CS Vulnerability Let Attacker Deny Service Over a Network

Microsoft has issued a security advisory regarding a new vulnerability in Active Directory Certificate Services (AD CS) that could allow…

82,000+ WordPress Sites Exposed to Remote Code Execution Attacks
14
May
2025

82,000+ WordPress Sites Exposed to Remote Code Execution Attacks

Critical vulnerabilities were identified in TheGem, a premium WordPress theme with more than 82,000 installations worldwide.  Researchers identified two separate…

Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network
14
May
2025

Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network

Microsoft’s May 2025 Patch Tuesday has addressed several critical vulnerabilities in Windows Remote Desktop services that could allow attackers to…

Ivanti ITSM Vulnerability Let Remote Attacker Gain Administrative Access
14
May
2025

Ivanti ITSM Vulnerability Let Remote Attacker Gain Administrative Access

Ivanti has released security updates to address a critical authentication bypass vulnerability in its Neurons for ITSM (IT Service Management)…

FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code
14
May
2025

FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Fortinet has disclosed a critical stack-based buffer overflow vulnerability (CVE-2025-32756) affecting multiple products in its security portfolio, with confirmed exploitation…