Category: CyberSecurityNews

Beware of Free File Word To PDF Converter That Delivers Malware
18
Mar
2025

Beware of Free File Word To PDF Converter That Delivers Malware

The FBI has issued an urgent warning about the rising threat of malicious file conversion tools that are being used…

23,000 GitHub Repositories Targeted In Supply Chain Attack
18
Mar
2025

23,000 GitHub Repositories Targeted In Supply Chain Attack

In a massive security breach discovered this week, approximately 23,000 GitHub repositories have been compromised in what security experts are…

Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit
18
Mar
2025

Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit

Security researchers have confirmed that a critical remote code execution (RCE) vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being…

Google Released Open Source Version of OSV-Scanner Tool for Vulnerability Scanning
18
Mar
2025

Google Released Open Source Version of OSV-Scanner Tool for Vulnerability Scanning

Google has officially launched OSV-Scanner V2.0.0, a major upgrade to its open-source vulnerability scanning tool.  Released on March 17, 2025,…

Espressif Systems Vulnerabilities Let Attackers Execute Arbitrary Code
17
Mar
2025

Espressif Systems Vulnerabilities Let Attackers Execute Arbitrary Code

Security researchers have uncovered several critical vulnerabilities in Espressif Systems’ ESP-IDF framework that could allow attackers to execute arbitrary code…

Zoom Team Chat Decrypted to Uncover User Activities
17
Mar
2025

Zoom Team Chat Decrypted to Uncover User Activities

In a significant development for digital forensics investigators, new research has revealed comprehensive methods to decrypt Zoom Team Chat databases,…

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware
15
Mar
2025

DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware

Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite…

Top Cybersecurity Tools of 2025 To Managing Remote Device Threats
15
Mar
2025

Top Cybersecurity Tools of 2025 To Managing Remote Device Threats

The rise of remote work has significantly increased the attack surface for cybercriminals, making robust cybersecurity tools more critical than…

New Context Compliance Attack Jailbreaks Most of The Major AI Models
14
Mar
2025

New Context Compliance Attack Jailbreaks Most of The Major AI Models

A new, surprisingly simple method called Context Compliance Attack (CCA) has proven effective at bypassing safety guardrails in most leading…

Black Basta Ransomware Attack Edge Network Devices With Automated Brute Force Attacks
14
Mar
2025

Black Basta Ransomware Attack Edge Network Devices With Automated Brute Force Attacks

A Russian-speaking actor using the Telegram handle @ExploitWhispers leaked internal chat logs of Black Basta Ransomware-as-a-Service (RaaS) members on February…

Hackers Allegedly Selling 3.17 Million Records of Honda Cars India Customers
14
Mar
2025

Hackers Allegedly Selling 3.17 Million Records of Honda Cars India Customers

A hacker operating under the pseudonym “Empire” has allegedly listed a database containing 3,176,958 records from Honda Cars India Ltd…

CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits
14
Mar
2025

CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has recently issued multiple Industrial Control Systems (ICS) advisories highlighting significant security vulnerabilities…