Category: CyberSecurityNews

Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges
06
Oct
2025

Zabbix Agent and Agent 2 for Windows Vulnerability Let Attackers Escalate Privileges

A critical security vulnerability has been discovered in Zabbix Agent and Agent 2 for Windows that allows attackers with local…

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality
06
Oct
2025

Microsoft Teams Set to Introduce Highly Anticipated Multitasking Functionality

Microsoft is set to roll out a highly anticipated multitasking feature for its Teams platform, which will allow users to…

Google Chrome RCE Vulnerability Details Released Along with Exploit Code
06
Oct
2025

Google Chrome RCE Vulnerability Details Released Along with Exploit Code

Researchers have published the full technical details and exploit code for a critical remote code execution (RCE) vulnerability in Google…

QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code
06
Oct
2025

QNAP NetBak Replicator Vulnerability Let Attackers Execute Unauthorized Code

QNAP has released a security advisory detailing a vulnerability in its NetBak Replicator utility that could allow local attackers to…

Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution
06
Oct
2025

Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution

A critical use-after-free vulnerability, identified as CVE-2025-49844, has been discovered in Redis servers, enabling authenticated attackers to achieve remote code…

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
06
Oct
2025

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks

With the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity:…

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access
06
Oct
2025

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo…

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
06
Oct
2025

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and…

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability
06
Oct
2025

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability

A critical zero-day vulnerability in Oracle E-Business Suite has emerged as a significant threat to enterprise environments, with proof-of-concept (PoC)…

Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files
06
Oct
2025

Hackers Exploit Zimbra Vulnerability as 0-Day with Weaponized iCalendar Files

A zero-day vulnerability in the Zimbra Collaboration Suite (ZCS) was actively exploited in targeted attacks earlier in 2025. The flaw,…

Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users
05
Oct
2025

Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users

Microsoft has announced a significant security enhancement for Outlook users, implementing the retirement of inline SVG image support across Outlook…

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code
05
Oct
2025

Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code

Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used game development…