Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail
20
Jan
2025

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Hackers have deployed malicious npm packages designed to exfiltrate Solana private keys through Gmail’s trusted infrastructure, as uncovered recently by…

week in security
20
Jan
2025

A week in security (January 13 – January 19)

January 17, 2025 – A cybercriminal campaign linked to Russia is deploying QR codes to access the WhatsApp accounts of…

PoC Exploit Released For QNAP Remote Code Execution Vulnerability
20
Jan
2025

PoC Exploit Released For QNAP Remote Code Execution Vulnerability

A critical remote code execution (RCE) vulnerability designated as CVE-2024-53691 has been identified in the QNAP QTS/QuTS hero operating system….

Rhino Linux 2025.1 Released - Update Now!
20
Jan
2025

Rhino Linux 2025.1 Released – Update Now!

Rhino Linux is roaring into the new year with the exciting release of Rhino Linux 2025.1! After a brief pause to…

Considerations for Selecting the Best API Authentication Option
20
Jan
2025

Considerations for Selecting the Best API Authentication Option

Implementing API authentication is one of the most critical stages of API design and development. Properly implemented authentication protects data,…

Microsoft Configuration Manager Vulnerability Allows Remote Code Execution
20
Jan
2025

Microsoft Configuration Manager Vulnerability Allows Remote Code Execution

A critical vulnerability, CVE-2024-43468, has been identified in Microsoft Configuration Manager (ConfigMgr), posing a severe security risk to organizations relying…

Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
20
Jan
2025

Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop

Cybersecurity researchers have uncovered a major flaw in the Windows BitLocker encryption system, allowing attackers to access encrypted data without…

Neuberger Resigns From National Security Council
20
Jan
2025

Neuberger Resigns From National Security Council

Anne Neuberger, the Deputy National Security Advisor, Cyber & Emerging Tech at National Security Council, The White House, resigned from…

Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited
20
Jan
2025

Windows Common Log File System Zero-day Vulnerability (CVE-2024-49138) Exploited

A zero-day vulnerability in the Windows Common Log File System (CLFS) driver, designated as CVE-2024-49138. This critical flaw, identified by…

Naveen Goud
20
Jan
2025

How a TikTok Ban Could Address Cybersecurity Concerns for the US Government

In recent years, the debate surrounding the potential ban of TikTok in the United States has intensified, driven primarily by…

Malicious npm Packages
20
Jan
2025

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

Jan 20, 2025Ravie LakshmananSupply Chain Attack / Solana Cybersecurity researchers have identified three sets of malicious packages across the npm…

Windows 11 BitLocker-Encrypted Files Accessed Without Disassembling Laptops
20
Jan
2025

Windows 11 BitLocker-Encrypted Files Accessed Without Disassembling Laptops

Researchers demonstrated how attackers can bypass its protections without physically tampering with the device. The exploit, known as “bitpixie” (CVE-2023-21563),…