Category: CyberSecurityNews

Ivanti Endpoint Manager Vulnerabilities Allows Attackers To Extract Sensitive Information
16
Jan
2025

Ivanti Endpoint Manager Vulnerabilities Allows Attackers To Extract Sensitive Information

Ivanti addressed multiple severe vulnerabilities in its Endpoint Manager (EPM) software, potentially exposing organizations to significant data breaches. The most…

Botnet Malware Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records
16
Jan
2025

Botnet Malware Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records

Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems…

2024 CVE Review - "Critical, High, Medium" Position Shifting in Cybersecurity
16
Jan
2025

2024 CVE Review – “Critical, High, Medium” Position Shifting in Cybersecurity

As the calendar turns to 2025, cybersecurity professionals are taking stock of key trends in Common Vulnerabilities and Exposures (CVEs)…

0-Click RCE Vulnerability in Samsung Smartphones Let Attackers Trigger OOB Write - Technical Analysis
16
Jan
2025

0-Click RCE Vulnerability in Samsung Smartphones Let Attackers Trigger OOB Write – Technical Analysis

Google Security researchers have disclosed a critical vulnerability, tagged as CVE-2024-49415, affecting Samsung smartphones last year and reported to Samsung…

Apple Opens Applications for Information Security Internship
16
Jan
2025

Apple Opens Applications for Information Security Internship

If you’re a tech-savvy student eager to start career in cyber security, Apple has just announced an exciting opportunity for…

Hackers Released 15,000+ Unique Fortigate Firewall Configs
16
Jan
2025

Hackers Released 15,000+ Unique Fortigate Firewall Configs

A hacking collective known as the “Belsen Group” has released over 15,000 unique FortiGate firewall configurations online. The data dump,…

CISA Released Free Microsoft Expanded Cloud Logging Playbook (PDF)
16
Jan
2025

CISA Released Free Microsoft Expanded Cloud Logging Playbook (PDF)

The Cybersecurity and Infrastructure Security Agency (CISA) has released the Microsoft Expanded Cloud Logs Implementation Playbook, a comprehensive guide aimed…

Palo Alto Networks Expedition Tool Flaw Let Attackers Access Firewall Passwords
15
Jan
2025

Palo Alto Networks Expedition Tool Flaw Let Attackers Access Firewall Passwords

Palo Alto Networks has disclosed multiple critical security vulnerabilities in its Expedition migration tool, including a concerning OS command injection…

Aembit Announces Speaker Lineup for the Inaugural NHIcon
15
Jan
2025

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated…

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine
15
Jan
2025

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine

Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language…

Windows 11 Security Features Bypassed to Execute Arbitrary Code in Kernel Mode
15
Jan
2025

Windows 11 Security Features Bypassed to Execute Arbitrary Code in Kernel Mode

Security researchers have discovered vulnerabilities in Windows 11’s core security features that could allow attackers to bypass multiple protection mechanisms…

Cl0p Ransomware Group Releases List of Victims Compromised Using Cleo
15
Jan
2025

Cl0p Ransomware Group Releases List of Victims Compromised Using Cleo

The notorious Cl0p ransomware group has published a list of companies compromised through vulnerabilities in Cleo’s managed file transfer (MFT)…