Category: CyberSecurityNews

Chrome Type Confusion Vulnerability
08
Jan
2025

Chrome Type Confusion Vulnerability Let Attackers Execute Arbitrary Code Remotely

The Chrome team has announced that the Stable channel has been updated to 131.0.6778.264/.265 for Windows and macOS, and 131.0.6778.264…

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication
08
Jan
2025

Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication

A new security advisory has been released regarding several vulnerabilities in SonicWall’s SonicOS software, which could enable attackers to bypass…

Kaaviya Ragupathy
08
Jan
2025

New BIOS/UEFI Vulnerabilities Lets Hackers Hijack Your Firmware

Researchers have identified critical vulnerabilities in Illumina iSeq 100 DNA sequencers due to the absence of essential security features such…

T-Mobile Sued
08
Jan
2025

T-Mobile Sued Over Massive Data Breach Impacting Over 2 Million Users

Washington State Attorney General Bob Ferguson has filed a consumer protection lawsuit against T-Mobile, accusing the telecommunications giant of failing…

32 Million Windows 10 Devices At Risk As Microsoft Ends Support
08
Jan
2025

32 Million Windows 10 Devices At Risk As Microsoft Ends Support

Microsoft prepares to end support for its Windows 10 operating system on October 14, 2025. Approximately 32 million devices in…

48,000+ Vulnerable SonicWall Devices Under Attack From Akira And Fog Ransomware
08
Jan
2025

48,000+ Vulnerable SonicWall Devices Under Attack From Akira And Fog Ransomware

Over 48,000 SonicWall devices remain vulnerable to a critical security flaw, exposing organizations worldwide to ransomware attacks. The vulnerability, identified…

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner
08
Jan
2025

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

A significant PHP server vulnerability identified as CVE-2024-4577 was exploited to inject PacketCrypt Classic Cryptocurrency Miner. This PHP CGI Argument…

Top 6 Ways To Back Your Business Up With Cyber Threat Intelligence
08
Jan
2025

Top 6 Ways To Back Your Business Up With Cyber Threat Intelligence

Threat intelligence is a cornerstone of a reliable cybersecurity framework. It implies gathering information about сyber threats, analyzing them, and…

image
08
Jan
2025

Security Risk Advisors joins the Microsoft Intelligent Security Association

Security Risk Advisors today announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of…

image
07
Jan
2025

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise…

New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data
07
Jan
2025

WordPress Plugin Weaponizes Legit Sites To Steal Customer Payment Data

PhishWP, a newly discovered WordPress plugin, is being used by cybercriminals to maliciously convert legitimate websites into phishing traps, putting…

Nvidia Unveils Digits, ,000 Personal AI Supercomputer
07
Jan
2025

Nvidia Unveils Digits, $3,000 Personal AI Supercomputer

NVIDIA has officially launched Project DIGITS, a groundbreaking personal AI supercomputer priced at $3,000. Aimed at AI researchers, data scientists, and students…