Category: CyberSecurityNews

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack
07
Mar
2025

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack

A series of critical vulnerabilities in DrayTek Vigor routers widely deployed in small office/home office (SOHO) environments have been uncovered,…

Operation Sea Elephant Attacking Organizations to Steal Research Details
07
Mar
2025

Operation Sea Elephant Attacking Organizations to Steal Research Details

A sophisticated cyber espionage campaign dubbed “Operation Sea Elephant” has been discovered targeting scientific research organizations, with a particular focus…

Microsoft 365 Announces E5 Security for Business Premium Customers as Add-on
07
Mar
2025

Microsoft 365 Announces E5 Security for Business Premium Customers as Add-on

Microsoft has announced the immediate availability of Microsoft 365 E5 Security as a cost-effective add-on for Business Premium subscribers, marking…

CISA Warns of Edimax IC-7100 IP Camera 0-day Vulnerability
07
Mar
2025

CISA Warns of Edimax IC-7100 IP Camera 0-day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding a severe vulnerability in the Edimax IC-7100…

GitHub Details How Security Professionals Can Use Copilot to Analyze Logs
07
Mar
2025

GitHub Details How Security Professionals Can Use Copilot to Analyze Logs

GitHub has unveiled groundbreaking applications of its AI-powered coding assistant, Copilot, specifically tailored for security professionals analyzing system logs and…

Enabling Incognito Mode in RDP to Hide All the Traces
07
Mar
2025

Enabling Incognito Mode in RDP to Hide All the Traces

Microsoft’s Remote Desktop Protocol (RDP) has introduced a lesser-known but critical security feature colloquially referred to as “incognito mode” through…

North Korean IT Workers Using GitHub To Attack Organization Globally
07
Mar
2025

North Korean IT Workers Using GitHub To Attack Organization Globally

Cybersecurity research firm NISOS has uncovered a network of suspected North Korean IT workers who are leveraging GitHub to create…

AMD Microcode Signature Verification Vulnerability Let Attackers Load Malicious Patches
07
Mar
2025

AMD Microcode Signature Verification Vulnerability Let Attackers Load Malicious Patches

Security researchers have uncovered a critical vulnerability in AMD Zen CPUs that allows attackers with elevated privileges to load malicious…

Cisco Secure Client for Windows Let Attackers Execute Arbitrary Code
07
Mar
2025

Cisco Secure Client for Windows Let Attackers Execute Arbitrary Code

A newly identified vulnerability in the Cisco Secure Client for Windows could allow attackers to execute arbitrary code with SYSTEM…

Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community
06
Mar
2025

Threat Actors Mimic Electronic Frontier Foundation To Attack Gaming Community

Cybersecurity researchers have uncovered a sophisticated campaign targeting the Albion Online gaming community through impersonation of the Electronic Frontier Foundation…

How to Analyse Real-Time Linux Malware Network Traffic
06
Mar
2025

How to Analyse Real-Time Linux Malware Network Traffic

Network traffic analysis has emerged as one of the most effective methods for detecting and investigating linux based malware infections…

Misconfigured Apache Airflow Servers Exposes Login Credentials to Hackers
06
Mar
2025

Misconfigured Apache Airflow Servers Exposes Login Credentials to Hackers

A critical security oversight in widely used Apache Airflow instances has exposed credentials for platforms like AWS, Slack, PayPal, and…