Category: CyberSecurityNews

MediaTek Processor Vulnerabilities
07
Jan
2025

Critical MediaTek Processor RCE Vulnerability Impacts Millions of Devices

MediaTek, one of the world’s largest semiconductor companies, has disclosed a series of security vulnerabilities in its chipsets that could…

40,000+ CVEs Published In 2024
07
Jan
2025

40,000+ CVEs Published In 2024, Marking A 38% Increase From 2023

The cybersecurity landscape witnessed unprecedented vulnerabilities during 2024, with a record-breaking 40,009 Common Vulnerabilities and Exposures (CVEs) published. This marks…

Redis Server Vulnerabilities Let Attackers Execute Remote Code
07
Jan
2025

Redis Server Vulnerabilities Let Attackers Execute Remote Code

Two critical vulnerabilities have been identified in Redis, the widely used in-memory database, potentially exposing millions of systems to denial-of-service…

Dark Web Market & Threat Predictions for 2025
07
Jan
2025

Dark Web Market & Threat Predictions for 2025

As the world navigated an evolving cybersecurity landscape in 2024, trends in malware, ransomware, and dark web activities highlighted the…

OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys
07
Jan
2025

OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys

A critical vulnerability, identified as CVE-2024-8474, has been discovered in OpenVPN Connect, a popular VPN client software. This flaw could…

AMD & Dell Unveil Unveils Laptops Powered by Ryzen AI Processors
07
Jan
2025

AMD & Dell Unveil Unveils AI Laptops Powered by Ryzen Processors

AMD and Dell Technologies revealed a new lineup of commercial laptops and desktops powered by AMD’s cutting-edge Ryzen AI PRO…

How Social Proof and Digital Trust Shape Online Security and Influence
06
Jan
2025

How Social Proof and Digital Trust Shape Online Security and Influence

Social proof and digital trust are shaping how we navigate the online world. Social proof—our tendency to look at others’…

Hackers Weaponize Security Testing By Weaponizing npm, PyPI, And Ruby Exploit Packages
06
Jan
2025

Hackers Weaponize Pentesting Tools With Malicious npm, PyPI, & Ruby Packages

Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage…

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus
06
Jan
2025

India’s First Global Computer Virus

A throwback to January 5, 1990, marks the day the Joshi virus was unleashed — a significant event in the…

New FireScam Android Malware Abusing Firebase Services To Evade Detection
06
Jan
2025

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam, an information stealer malware with spyware capabilities, is being disseminated as a fake “Telegram Premium” application. The malware spreads…

EAGERBEE Malware Expands Arsenal With Advanced Payloads And Command Shells
06
Jan
2025

EAGERBEE Malware Expands Arsenal With Advanced Payloads & Command Shells

The EAGERBEE malware, a sophisticated backdoor previously linked to cyberespionage campaigns in the Middle East and Southeast Asia, has undergone…

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
06
Jan
2025

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability

A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as “regreSSHion,” has been released, raising alarms across…