Category: CyberSecurityNews

Aviatrix Controller RCE Vulnerability Exploited In The Wild
13
Jan
2025

Aviatrix Controller RCE Vulnerability Exploited In The Wild

A critical remote code execution (RCE) vulnerability, CVE-2024-50603, has been actively exploited in the wild, posing significant risks to cloud…

Ako Ransomware Abusing Windows API Calls To Detect Infected System Locations
13
Jan
2025

Ako Ransomware Abusing Windows API Calls To Detect Infected System Locations

Ako, commonly referred to as MedusaReborn, is a C++-based ransomware strain that has been active since January 2020. It functions…

GPU Driver Vulnerabilities in Imagination Let Attackers Gain Kernel Access Remotely
13
Jan
2025

GPU Driver Vulnerabilities in Imagination Let Attackers Gain Kernel Access Remotely

Imagination Technologies, a leader in GPU innovation, has issued updates to address a series of critical vulnerabilities identified in its…

Researchers Detailed ZAP Scanner's Capabilities in Identifying Security Flaws
13
Jan
2025

Researchers Detailed ZAP Scanner’s Capabilities in Identifying Security Flaws

Researchers have conducted a detailed study on the capabilities of ZAP (Zed Attack Proxy), an open-source tool widely used for…

Three Cryptomixer Masterminds Charged Processing Ransomware Payments
13
Jan
2025

Three Cryptomixer Masterminds Charged Processing Ransomware Payments

The U.S. Department of Justice (DoJ) has indicted three Russian nationals, Roman Vitalyevich Ostapenko, Alexander Evgenievich Oleynik, and Anton Vyachlavovich…

How Harold Teasdale Automates the Fight Against Insider Threats and Access Control Nightmares
13
Jan
2025

How Harold Teasdale Automates the Fight Against Insider Threats and Access Control Nightmares

Cybersecurity is no longer just about protecting systems from external attackers. In an increasingly digitized world, the greatest risks often…

Hackers Exploiting YouTube to Deliver Malware Bypassing Antivirus Detections
13
Jan
2025

Hackers Exploiting YouTube to Deliver Malware Bypassing Antivirus Detections

Cybercriminals are increasingly leveraging YouTube’s vast platform to distribute malware, bypassing traditional antivirus detections and exploiting users’ trust in the…

Critical macOS Sandbox Vulnerability PoC Exploit Released Online
13
Jan
2025

Critical macOS Sandbox Vulnerability PoC Exploit Released Online

A proof-of-concept exploit was released for a critical vulnerability impacting macOS systems, identified as CVE-2024-54498. Security researcher @wh1te4ever recently revealed…

33,542 Ivanti Connect Secure Instances Exposed as Exploitation of CVE-2025-0282 Unfolds
13
Jan
2025

33,542 Ivanti Connect Secure Instances Exposed as Exploitation of CVE-2025-0282 Unfolds

A critical security vulnerability, CVE-2025-0282, has been identified and exploited in the wild, affecting Ivanti Connect Secure, Policy Secure, and…

New Banshee Malware Targets macOS Users to Steal Code
13
Jan
2025

New Banshee Malware Targets macOS Users to Steal Code

Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis…

Cyber Attack News, Vulnerabilities & Data Breaches
12
Jan
2025

Cyber Attack News, Vulnerabilities & Data Breaches

Welcome to this week’s Cyber Security Newsletter, where we explore the latest advancements and important updates in the field of…

IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI
12
Jan
2025

IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI

IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to cross-site scripting (XSS) attacks. The vulnerability, identified…