Category: CyberSecurityNews

CISOs Face 2025 Cyber Threats with Shrinking Budgets and High Demands
14
Apr
2025

CISOs Face 2025 Cyber Threats with Shrinking Budgets and High Demands

Chief Information Security Officers (CISOs) find themselves at the intersection of escalating threats, tighter budgets, and rising expectations. This year…

Medusa Ransomware Claims NASCAR Hack, Demands $4 Million Ransom
14
Apr
2025

Medusa Ransomware Claims NASCAR Hack, Demands $4 Million Ransom

The Medusa ransomware group has reportedly launched a major cyberattack on the National Association for Stock Car Auto Racing (NASCAR),…

Chinese Hackers Exploit Ivanti VPN Vulnerabilities to Infiltrate Organizations
14
Apr
2025

Chinese Hackers Exploit Ivanti VPN Vulnerabilities to Infiltrate Organizations

A China-linked advanced persistent threat (APT) group has exploited critical vulnerabilities in Ivanti Connect Secure VPN appliances to infiltrate organizations…

Cybersecurity Leadership in Crisis? CISO Resignations Spike After Major Breaches
14
Apr
2025

Cybersecurity Leadership in Crisis? CISO Resignations Spike After Major Breaches

The cybersecurity landscape is witnessing an alarming trend, Chief Information Security Officers (CISOs) are leaving their positions at unprecedented rates….

Hackers Allegedly Leaked 1.59 Million Rows of Indian Insurance Users Sensitive Data
14
Apr
2025

Hackers Allegedly Leaked 1.59 Million Rows of Indian Insurance Users Sensitive Data

Hackers allegedly claim that a software company based in India was compromised on December 19, 2024, by a hacker identified…

Seven Years Old Cisco Vulnerability Exposes Cisco Devices to Remote Code Execution Attacks
12
Apr
2025

Seven Years Old Cisco Vulnerability Exposes Cisco Devices to Remote Code Execution Attacks

A seven-year-old vulnerability in Cisco networking equipment continues to pose significant security risks, enabling attackers to execute remote code on…

Hackers Exploiting Domain Controller to Deploy Ransomware Using RDP
12
Apr
2025

Hackers Exploiting Domain Controller to Deploy Ransomware Using RDP

Microsoft has recently uncovered a sharp rise in ransomware attacks exploiting domain controllers (DCs) through Remote Desktop Protocol (RDP), with…

Hackers Actively Exploits Patched Fortinet FortiGate Devices to Gain Root Access
12
Apr
2025

Hackers Actively Exploits Patched Fortinet FortiGate Devices to Gain Root Access

Fortinet has uncovered a sophisticated post-exploitation technique used by a threat actor to maintain unauthorized access to FortiGate devices, even…

Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows
12
Apr
2025

Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows

Google has announced the launch of Agent2Agent Protocol (A2A), a groundbreaking open protocol designed to enable AI agents to communicate…

Sapphire Werewolf Enhances Toolkit With New Amethyst Stealer to Attack Energy Companies
12
Apr
2025

Sapphire Werewolf Enhances Toolkit With New Amethyst Stealer to Attack Energy Companies

Cybersecurity experts have detected a sophisticated campaign targeting energy sector companies, as the threat actor known as Sapphire Werewolf deploys…

NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data
12
Apr
2025

NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data

A critical vulnerability in NVIDIA’s Container Toolkit, CVE-2024-0132, remains exploitable due to an incomplete patch, endangering AI infrastructure and sensitive…

0-Click RCE in the SuperNote Nomad E-ink Tablet Lets Hackers Install Rootkit & Gain Full Control
12
Apr
2025

0-Click RCE in the SuperNote Nomad E-ink Tablet Lets Hackers Install Rootkit & Gain Full Control

Security researcher Prizm Labs has discovered a serious flaw in the SuperNote A6 X2 Nomad, a well-known 7.8-inch E-Ink tablet…