Category: CyberSecurityNews

3 SOC Challenges Solved by Threat Intelligence
04
Feb
2025

3 SOC Challenges Solved by Threat Intelligence

An organization’s cyber security operation center (SOC) is a unit in charge of cyber threat prevention and mitigation.  Within this…

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools
04
Feb
2025

New Tiny FUD Attacking macOS Users Bypassing Antivirus and Security Tools

A new, highly sophisticated malware known as Tiny FUD has been identified, targeting macOS users with advanced evasion techniques that…

Apple Service Ticket portal Vulnerability Exposes Millions of Users Data
04
Feb
2025

Apple Service Ticket portal Vulnerability Exposes Millions of Users Data

A critical security flaw in Apple’s service ticket portal has come to light, potentially exposing the sensitive data of millions…

Hackers Using HTTP Client Tools To Takeover Microsoft 365 Accounts
04
Feb
2025

Hackers Using HTTP Client Tools To Takeover Microsoft 365 Accounts

Hackers have increasingly been using HTTP client tools to orchestrate sophisticated account takeover attacks on Microsoft 365 environments. A staggering…

Researchers Uncovers New Methods To Defend AI Models Against Universal Jailbreaks
04
Feb
2025

Researchers Uncovers New Methods To Defend AI Models Against Universal Jailbreaks

Researchers from the Anthropic Safeguards Research Team have developed a new approach to protect AI models from universal jailbreaks. This…

Critical Windows OLE Zero-Click Vulnerability Let Attacker to Execute Arbitrary Code
04
Feb
2025

Critical Windows OLE Zero-Click Vulnerability Let Attacker to Execute Arbitrary Code

A critical security flaw, identified as CVE-2025-21298, has been disclosed in Microsoft’s Windows Object Linking and Embedding (OLE) technology.  This…

SpyCloud Pioneers the Shift to Holistic Identity Threat Protection
04
Feb
2025

SpyCloud Pioneers the Shift to Holistic Identity Threat Protection

SpyCloud’s Identity Threat Protection solutions spearhead a holistic identity approach to security, illuminating correlated hidden identity exposures and facilitating fast,…

Apache Cassandra Vulnerability Let Attackers Gain Access to the Data Centers
04
Feb
2025

Apache Cassandra Vulnerability Let Attackers Gain Access to the Data Centers

A new security vulnerability, identified as CVE-2025-24860, has been disclosed in Apache Cassandra, a widely used distributed database system. The…

Beware of Fake DeepSeek PyPI Packages That Delivers Malware
04
Feb
2025

Beware of Fake DeepSeek PyPI Packages That Delivers Malware

Researchers from the Positive Technologies Expert Security Center (PT ESC) have identified and prevented a malicious campaign targeting users of…

Google Patched Linux Kernel Vulnerability In Android Allows Attackers Gain Write Access
04
Feb
2025

Google Patched Linux Kernel Vulnerability In Android Allows Attackers Gain Write Access

Google has released its February 2025 Android Security Bulletin, which addresses 47 vulnerabilities impacting Android devices. A notable issue is a patched…

FlexibleFerret Malware Attacking macOS Users, Evading XProtect Detections
04
Feb
2025

FlexibleFerret Malware Attacking macOS Users, Evading XProtect Detections

A new variant of malware, known as FlexibleFerret, has been identified targeting macOS users while evading detection by Apple’s XProtect…

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware 
04
Feb
2025

Hackers Exploiting 7-Zip Zero-Day Vulnerability to Deploy SmokeLoader Malware 

Hackers have exploited a zero-day vulnerability in the popular file archiver 7-Zip to deploy SmokeLoader malware.  The vulnerability, tracked as…