Category: CyberSecurityNews

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code
05
Feb
2025

Multiple security Vulnerabilities in IBM Cloud Pak Let Attackers Execute Remote Code

IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software.  These vulnerabilities, if…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A new report from FortiGuard Labs reveals that Chinese hackers are actively targeting Linux devices with a sophisticated SSH backdoor…

Threat Actors Exploiting DeepSeek's Rise To Fuel Cyber Attacks
05
Feb
2025

Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks

The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning…

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30
05
Feb
2025

Researchers Replicated DeepSeek’s R1-Zero Model for Just $30

In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just…

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
05
Feb
2025

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access

The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik…

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
05
Feb
2025

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access

A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code
05
Feb
2025

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code

The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux….

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin
05
Feb
2025

AMD SEV Vulnerability Allows Malicious CPU Microcode Injection as Admin

AMD has disclosed a high-severity vulnerability (CVE-2024-56161) in its Secure Encrypted Virtualization (SEV) technology, which could allow attackers with administrative…

GrubHub Data Breach - Customers Phone Numbers Exposed 
04
Feb
2025

GrubHub Data Breach – Customers Phone Numbers Exposed 

The popular food delivery platform Grubhub has disclosed a significant data breach involving unauthorized access to customer, merchant, and driver…

3 SOC Challenges Solved by Threat Intelligence
04
Feb
2025

3 SOC Challenges Solved by Threat Intelligence

An organization’s cyber security operation center (SOC) is a unit in charge of cyber threat prevention and mitigation.  Within this…

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools
04
Feb
2025

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools

A new, highly sophisticated malware known as Tiny FUD has been identified, targeting macOS users with advanced evasion techniques that…