Category: CyberSecurityNews

Beware of Fake BSOD Delivered by Malicious Python Script
16
Feb
2025

Beware of Fake BSOD Delivered by Malicious Python Script

A recently discovered Python script has been flagged as a potential cybersecurity threat due to its use of a clever…

New Go-Based Malware Exploits Telegram and Use It as C2 Channel
16
Feb
2025

New Go-Based Malware Exploits Telegram and Use It as C2 Channel

Researchers have identified a new backdoor malware, written in Go programming language, that leverages Telegram as its command-and-control (C2) channel….

SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild
16
Feb
2025

SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild

A critical authentication bypass vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now being actively exploited in the wild, cybersecurity…

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability
14
Feb
2025

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability

Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as CVE-2025-0108, affecting their PAN-OS software. GreyNoise…

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code
14
Feb
2025

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code

A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute arbitrary code on affected systems…

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens
14
Feb
2025

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as “device code phishing” to…

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution
14
Feb
2025

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution

Researchers have uncovered a high-severity SQL injection vulnerability, CVE-2025-1094, affecting PostgreSQL’s interactive terminal tool, psql.  This flaw was identified during…

Salt Typhoon Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 
14
Feb
2025

Salt Typhoon Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 

Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as “Salt Typhoon,” also referred to as…

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code
14
Feb
2025

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code

A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master Utility, a software tool designed…

Progress LoadMaster Security Vulnerability let Attackers Execute Arbitrary System Commands 
11
Feb
2025

Progress LoadMaster Security Vulnerability let Attackers Execute Arbitrary System Commands 

Progress has disclosed multiple critical security vulnerabilities affecting its LoadMaster product line, including the Multi-Tenant (MT) hypervisor.  These vulnerabilities, identified…

Discord Unveils New Privacy Feature to Ignore Users Without Knowing Them
11
Feb
2025

Discord Unveils New Privacy Feature to Ignore Users Without Knowing Them

Discord has introduced a groundbreaking privacy feature called “Ignore.” This announcement coincides with Safer Internet Day 2025, celebrated globally on…

SAP Security Update - 19 Vulnerabilities Across Multiple Products Patched
11
Feb
2025

SAP Security Update – 19 Vulnerabilities Across Multiple Products Patched

SAP has released 19 new Security Notes and two updates to existing patches in its February 2025 Security Patch Day,…