week in security
05
May
2025

A week in security (April 27 – May 3)

May 2, 2025 – Passwords are becoming things of the past. Passkeys are more secure, easier to manage, and speed…

New SonicBoom Attack Allows Bypass of Authentication for Admin Access
05
May
2025

New SonicBoom Attack Allows Bypass of Authentication for Admin Access

A critical new attack chain, dubbed “SonicBoom,” that enables remote attackers to bypass authentication and seize administrative control over enterprise…

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis
05
May
2025

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft’s WinDbg, dramatically simplifying Windows crash dump analysis. For…

Critical Webmin Vulnerability Let Remote Attackers Escalate Privileges to Root-Level
05
May
2025

Critical Webmin Vulnerability Let Remote Attackers Escalate Privileges to Root-Level

A critical security vulnerability in Webmin, a widely-used web-based system administration tool, has been discovered, allowing remote attackers to escalate…

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control
05
May
2025

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the “SonicBoom Attack Chain,” which allows hackers to bypass authentication…

Sansec uncovered a supply chain attack via 21 backdoored Magento extensions
05
May
2025

Sansec uncovered a supply chain attack via 21 backdoored Magento extensions

Sansec uncovered a supply chain attack via 21 backdoored Magento extensions Pierluigi Paganini May 05, 2025 Supply chain attack via…

Microsoft to Block Emails With 550 5.7.15 Access denied Error
05
May
2025

Microsoft to Block Emails With 550 5.7.15 Access denied Error

In a notable development that will affect numerous businesses globally, Microsoft has announced that it will commence the rejection of…

Naveen Goud
05
May
2025

Cyber threat emerge from Cyber Attacks on UK Companies

Over the past two weeks, media outlets have been rife with speculations about a significant cyber attack affecting three major…

Review: Effective Vulnerability Management - Help Net Security
05
May
2025

Review: Effective Vulnerability Management – Help Net Security

Effective Vulnerability Management offers a view of a key part of cybersecurity, showing how practices, tools, and processes can help…

Malware Steal Browser Credentials and Crypto Wallet Data
05
May
2025

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting…

Apache Parquet Java Vulnerability Let Attackers Execute Arbitrary Code
05
May
2025

Apache Parquet Java Vulnerability Let Attackers Execute Arbitrary Code

A new critical security vulnerability in Apache Parquet Java has been disclosed that could allow attackers to execute arbitrary code…

Naveen Goud
05
May
2025

The Growing Cyber Threat of Steganography: Concealing Malicious Activity in Plain Sight

In an era where cybercrime is rapidly evolving, security professionals and hackers alike have found new, innovative ways to conceal…