New Android Security Feature that Blocks Changing Sensitive Setting During Calls
17
Feb
2025

New Android Security Feature that Blocks Changing Sensitive Setting During Calls

Google has unveiled a groundbreaking security feature in Android 16 Beta 2 aimed at combating phone scams by blocking users…

Indian Post Office Portal Leak Exposes Thousands of KYC Records
17
Feb
2025

Indian Post Office Portal Leak Exposes Thousands of KYC Records

The Indian Post Office portal recently exposed the sensitive Know Your Customer (KYC) data of thousands of users due to…

CISO's Expert Guide To CTEM And Why It Matters
17
Feb
2025

CISO’s Expert Guide To CTEM And Why It Matters

Feb 17, 2025The Hacker NewsEnterprise Security / Attack Simulation Cyber threats evolve—has your defense strategy kept up? A new free…

ASUS
17
Feb
2025

Microsoft rolls out BIOS update that fixes ASUS blue screen issues

More ASUS customers can now install Windows 11 24H2 after applying a BIOS update that resolves blue screen of death…

New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects 
17
Feb
2025

New XCSSET Malware Attacking macOS Users by Infecting Xcode Projects 

Microsoft Threat Intelligence has identified an evolved iteration of the XCSSET malware family actively exploiting macOS developers via weaponized Xcode…

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
17
Feb
2025

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel…

$577M Cryptocurrency Fraud: Estonian Nationals Admit Guilt
17
Feb
2025

$577M Cryptocurrency Fraud: Estonian Nationals Admit Guilt

Two Estonian nationals have admitted their roles in planning a massive cryptocurrency Ponzi scheme that defrauded hundreds of thousands of…

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration
17
Feb
2025

IDOR vulnerability in ExHub Let Attacker Modify Web Hosting Configuration

A critical Insecure Direct Object Reference (IDOR) vulnerability was recently discovered in ExHub, a cloud-based platform for hulia-based development.  This…

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
17
Feb
2025

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Feb 17, 2025Ravie LakshmananThreat Intelligence / Cyber Attack Cybersecurity researchers have shed light on a new Golang-based backdoor that uses…

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead
17
Feb
2025

Opinion: Saudi plans to be an IT superpower, but challenges lie ahead

Saudi Arabia is spending big on IT, and on artificial intelligence (AI) in particular, in an effort to diversify from…

whoAMI attack could allow remote code execution within AWS account
17
Feb
2025

whoAMI attack could allow remote code execution within AWS account

whoAMI attack could allow remote code execution within AWS account Pierluigi Paganini February 17, 2025 Researchers warn that the whoAMI…

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication
17
Feb
2025

Multiple Russian Actors Attacking Orgs To Hack Microsoft 365 Accounts via Device Code Authentication

Security researchers at Volexity have uncovered multiple Russian threat actors conducting sophisticated social engineering and spear-phishing campaigns targeting Microsoft 365…