Cybercriminals opt for deepfakes to apply for remote jobs | Cybernews
05
Feb
2025

Cybercriminals opt for deepfakes to apply for remote jobs | Cybernews

Deepfakes and stolen Personally Identifiable Information (PII) can be used for more than hoaxes, phishing, and identity theft. Now, these…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an…

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
05
Feb
2025

Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access

The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik…

What’s the biggest cyber threat to your company: hackers, employees, or ransomware? | Cybernews
05
Feb
2025

What’s the biggest cyber threat to your company: hackers, employees, or ransomware? | Cybernews

Given the tremendous growth in cyberattacks during the COVID pandemic, it may be tempting to assume that external threats must…

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits
05
Feb
2025

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released nine advisories targeting security vulnerabilities in Industrial Control Systems (ICS). These…

Naveen Goud
05
Feb
2025

Can Smartwatches Be Targeted by Cyber Attacks?

Smartwatches have rapidly gained popularity due to their convenience, health-tracking capabilities, and seamless connectivity with smartphones and other devices. However,…

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
05
Feb
2025

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access

A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…

Semiconductor company is investigating a potential data breach | Cybernews
05
Feb
2025

Semiconductor company is investigating a potential data breach | Cybernews

RansomHouse gang claims to have stolen over 450GB from AMD semiconductor company. “On June 27, we became aware that a…

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access
05
Feb
2025

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access

In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…

Naveen Goud
05
Feb
2025

NSA asks iPhone users to use flap covers to banish privacy concerns

National Security Agency (NSA) of the United States, primarily known for its intelligence-gathering and surveillance activities in the name of…

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
05
Feb
2025

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…