Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
24
Apr
2025

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a…

Data breach class action costs mount up
24
Apr
2025

Data breach class action costs mount up

Organisations holding data on US citizens must do more to address gaps in their cyber security posture and respond to…

The Illusion of Truth: The Risks and Responses to Deepfake Technology
24
Apr
2025

The Illusion of Truth: The Risks and Responses to Deepfake Technology

Abstract In the age of information, where the line between reality and fiction is increasingly blurred, deepfake technology has emerged…

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw
24
Apr
2025

Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw

Cisco has issued a high-severity advisory (cisco-sa-erlang-otp-ssh-xyZZy) warning of a critical remote code execution (RCE) vulnerability in products using Erlang/OTP’s…

New SessionShark Phishing Kit Steals Session Tokens to Bypass Office 365 MFA
24
Apr
2025

New SessionShark Phishing Kit Bypasses MFA to Steal Office 365 Logins

SessionShark phishing kit bypasses Office 365 MFA by stealing session tokens. Experts warn of real-time attacks via fake login pages…

A 60-Second Walk In The Park
24
Apr
2025

A 60-Second Walk In The Park

24 Apr Cybercrime Magazine’s First YouTube Video: A 60-Second Walk In The Park Posted at 08:33h in Blogs by Taylor…

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)
24
Apr
2025

Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)

If your organization is using Commvault Command Center for your data protection, backup creation, configuration and restoration needs, you should…

159 CVEs
24
Apr
2025

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the…

Challenges persist as UK’s Cyber Security and Resilience Bill moves forward
24
Apr
2025

Challenges persist as UK’s Cyber Security and Resilience Bill moves forward

Since the government announced in the King’s speech last year that they would bring forward a Cyber Security and Resilience…

Crooks exploit the death of Pope Francis
24
Apr
2025

Crooks exploit the death of Pope Francis

Crooks exploit the death of Pope Francis Pierluigi Paganini April 24, 2025 Crooks exploit the death of Pope Francis, using…

Redefining AppSec Testing with Intelligent Scan Recommendations and Asset Classification
24
Apr
2025

Redefining AppSec Testing with Intelligent Scan Recommendations and Asset Classification

As 9 out of 10 valuable web apps are missing testing, we’re launching new capabilities to help teams know what…

Commvault RCE Vulnerability Exploited—PoC Released
24
Apr
2025

Commvault RCE Vulnerability Exploited—PoC Released

Enterprises and managed service providers globally are now facing urgent security concerns following the disclosure of a major pre-authenticated remote…