Category: CyberSecurityNews

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens
14
Feb
2025

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as “device code phishing” to…

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution
14
Feb
2025

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution

Researchers have uncovered a high-severity SQL injection vulnerability, CVE-2025-1094, affecting PostgreSQL’s interactive terminal tool, psql.  This flaw was identified during…

Salt Typhoon Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 
14
Feb
2025

Salt Typhoon Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 

Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as “Salt Typhoon,” also referred to as…

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code
14
Feb
2025

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code

A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master Utility, a software tool designed…

Progress LoadMaster Security Vulnerability let Attackers Execute Arbitrary System Commands 
11
Feb
2025

Progress LoadMaster Security Vulnerability let Attackers Execute Arbitrary System Commands 

Progress has disclosed multiple critical security vulnerabilities affecting its LoadMaster product line, including the Multi-Tenant (MT) hypervisor.  These vulnerabilities, identified…

Discord Unveils New Privacy Feature to Ignore Users Without Knowing Them
11
Feb
2025

Discord Unveils New Privacy Feature to Ignore Users Without Knowing Them

Discord has introduced a groundbreaking privacy feature called “Ignore.” This announcement coincides with Safer Internet Day 2025, celebrated globally on…

SAP Security Update - 19 Vulnerabilities Across Multiple Products Patched
11
Feb
2025

SAP Security Update – 19 Vulnerabilities Across Multiple Products Patched

SAP has released 19 new Security Notes and two updates to existing patches in its February 2025 Security Patch Day,…

A Security Mechanism To Stop AI-Based Breaking CAPTCHA
11
Feb
2025

A Security Mechanism To Stop AI-Based Breaking CAPTCHA

In the ongoing battle between cybersecurity and AI, researchers have introduced a groundbreaking innovation, IllusionCAPTCHA, a CAPTCHA system that leverages…

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025
11
Feb
2025

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025

January 2025 marked a significant month in the ransomware landscape, with Akira emerging as the leading threat. According to recent…

USB Army Knife - A Powerful Red Team Tool for Penetration Testers
11
Feb
2025

USB Army Knife – A Powerful Red Team Tool for Penetration Testers

The USB Army Knife is a versatile red-teaming tool for penetration testers that emulates a USB Ethernet adapter for traffic…

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data
11
Feb
2025

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data

SEOUL, South Korea’s National Intelligence Service (NIS) has raised concerns over the Chinese AI app DeepSeek, accusing it of “excessively”…

FinStealer Malware Attacking Leading Indian Bank's Mobile Users To Steal Login Credentials
11
Feb
2025

FinStealer Malware Attacking Leading Indian Bank’s Mobile Users To Steal Login Credentials

A sophisticated malware campaign dubbed “FinStealer” is actively targeting customers of a leading Indian bank through fraudulent mobile applications. The…