Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
05
Feb
2025

Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access

A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…

Semiconductor company is investigating a potential data breach | Cybernews
05
Feb
2025

Semiconductor company is investigating a potential data breach | Cybernews

RansomHouse gang claims to have stolen over 450GB from AMD semiconductor company. “On June 27, we became aware that a…

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access
05
Feb
2025

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access

In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…

Naveen Goud
05
Feb
2025

NSA asks iPhone users to use flap covers to banish privacy concerns

National Security Agency (NSA) of the United States, primarily known for its intelligence-gathering and surveillance activities in the name of…

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
05
Feb
2025

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…

Dutch university recovered ransomware payment with a $300k profit | Cybernews
05
Feb
2025

Dutch university recovered ransomware payment with a $300k profit | Cybernews

Even though the authorities recovered only a fraction of the payment made in Bitcoin three years ago, the victim made…

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

Is voice recognition another biometric surveillance tool? | Cybernews
05
Feb
2025

Is voice recognition another biometric surveillance tool? | Cybernews

Considering the alarm bells around biometric surveillance tech, should we be concerned about the popularity of voice technology? In 2002,…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

OpenNHP: Cryptography-driven zero trust protocol
05
Feb
2025

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….

North Korea backing healthcare ransom attacks in US
05
Feb
2025

North Korea backing healthcare ransom attacks in US

Cybercriminal groups linked to the rogue state have been using Maui ransomware to attack healthcare and public health organizations in…