CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released
20
Mar
2025

CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup…

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges
20
Mar
2025

Linux Kernel Out-of-bounds Write Vulnerability Let Attackers Escalate Privileges

A severe vulnerability in the Linux kernel has remained undetected for nearly two decades, allowing local users to gain root…

20
Mar
2025

CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup…

Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
20
Mar
2025

Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates

Kali Linux 2025.1a is now available. This release enhances existing features with improvements designed to streamline your experience. 2025 theme…

Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages
20
Mar
2025

Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

Mar 20, 2025Ravie LakshmananCybercrime / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign…

Attackers Embedding Malicious Word file into a PDF to Evade Detections
20
Mar
2025

Attackers Embedding Malicious Word file into a PDF to Evade Detections

A sophisticated attack vector dubbed “MalDoc in PDF” allows threat actors to bypass traditional security scanning by embedding malicious Word…

SpyX Data Breach Exposes Personal Information of Nearly 2 Million Users
20
Mar
2025

SpyX Data Breach Exposes Personal Information of Nearly 2 Million Users

SpyX, a company known for developing spyware, has experienced a data breach that compromised the personal information of nearly 2…

70% of leaked secrets remain active two years later
20
Mar
2025

70% of leaked secrets remain active two years later

Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials,…

41% of Success Logins Across Websites Involves Compromised Passwords
20
Mar
2025

41% of Success Logins Across Websites Involves Compromised Passwords

Password reuse continues to be one of the most significant security vulnerabilities in 2025, with alarming new data showing nearly…

Linux Kernel Vulnerability Allows Attackers to Escalate Privileges via Out-of-Bounds Write
20
Mar
2025

Linux Kernel Vulnerability Allows Attackers to Escalate Privileges via Out-of-Bounds Write

A recently discovered vulnerability in the Linux kernel, identified as CVE-2025-0927, poses a significant threat to system security. This flaw,…

How healthcare CISOs can balance security and accessibility without compromising care
20
Mar
2025

How healthcare CISOs can balance security and accessibility without compromising care

In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare…

vUS Sperm Donor Giant California Cryobank Hacked
20
Mar
2025

vUS Sperm Donor Giant California Cryobank Hacked

California Cryobank LLC, one of America’s largest sperm donor repositories, has confirmed a significant data breach that exposed sensitive customer…