A complete guide to exploiting advanced XXE vulnerabilities
11
Mar
2025

A complete guide to exploiting advanced XXE vulnerabilities

XML External Entity (XXE) vulnerabilities are one of the most overlooked yet impactful vulnerabilities in modern web applications. Although they’ve…

Researcher Hacked Embedded Devices To Extract The Firmware
11
Mar
2025

Researcher Hacked Embedded Devices To Extract The Firmware

A security researcher known as newp1ayer48 has successfully demonstrated a method to extract firmware from IoT and embedded devices using…

New Linux Kernel Code Written in Rust Aims to Eliminate Memory Safety Bugs
11
Mar
2025

New Linux Kernel Code Written in Rust Aims to Eliminate Memory Safety Bugs

The integration of Rust into the Linux kernel is a significant step forward in enhancing memory safety, a critical aspect…

Elon Musk blames a massive cyberattack for the X outages
11
Mar
2025

Elon Musk blames a massive cyberattack for the X outages

Elon Musk blames a massive cyberattack for the X outages Pierluigi Paganini March 10, 2025 Elon Musk said that the…

Apple iOS 18.4 Beta 3 Released With New Features & Enhancements
11
Mar
2025

Apple iOS 18.4 Beta 3 Released With New Features & Enhancements

Apple has taken another step toward the official release of iOS 18.4 by seeding the third developer beta of the…

Threat Actors Exploit EncryptHub for Multi-Stage Malware Attacks
11
Mar
2025

Threat Actors Exploit EncryptHub for Multi-Stage Malware Attacks

EncryptHub, a rising cybercriminal entity, has been under scrutiny by multiple threat intelligence teams, including Outpost24’s KrakenLabs. Recent investigations have…

Cloud IMS: The Confluence of Innovation and Security in Modern Telecommunications
11
Mar
2025

The Confluence of Innovation and Security in Modern Telecommunications

The telecom industry is at a major turning point. With 5G, IoT, and AI reshaping global connectivity, the need for…

North Korean Hackers Weaponizing ZIP Files To Execute Malicious PowerShell Scripts
11
Mar
2025

North Korean Hackers Weaponizing ZIP Files To Execute Malicious PowerShell Scripts

Security researchers have identified a sophisticated attack campaign attributed to APT37, a North Korean state-sponsored hacking group also known as…

Ragnar Loader Used by Multiple Ransomware Groups to Bypass Detection
11
Mar
2025

Ragnar Loader Used by Multiple Ransomware Groups to Bypass Detection

Ragnar Loader, a sophisticated toolkit associated with the Ragnar Locker ransomware group, has been instrumental in facilitating targeted cyberattacks on…

Garantex Crypto Exchange Seized, Two Charged in Laundering Scheme
11
Mar
2025

Garantex Crypto Exchange Seized, Two Charged in Laundering Scheme

International law enforcement disrupts Garantex, a multi-billion-dollar cryptocurrency exchange used for money laundering. Two individuals, Aleksej Besciokov and Aleksandr Mira…

TFE Hotels recovering from cyber incident
11
Mar
2025

TFE Hotels recovering from cyber incident – Security

TFE Hotels, which includes the Adina, Vibe and Travelodge brands, is recovering from a “cyber incident” disclosed earlier this month,…

CISA Adds 3 Ivanti Endpoint Manager Vulnerabilities to Known Exploited Vulnerabilities Catalog
11
Mar
2025

CISA Adds 3 Ivanti Endpoint Manager Vulnerabilities to Known Exploited Vulnerabilities Catalog

Today CISA added three Ivanti Endpoint Manager (EPM) vulnerabilities CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161 to its Known Exploited Vulnerabilities (KEV) catalog….