AuthID PrivacyKey protects users' biometric identities
29
Jan
2025

AuthID PrivacyKey protects users’ biometric identities

authID released PrivacyKey, a solution for protecting user biometric data while also avoiding all the compliance issues and risks related…

Hackerone logo
29
Jan
2025

HackerOne and AWS on the Power of Ethical Hacking

In an era where data breaches and cyberattacks dominate headlines, a new and unconventional approach to cybersecurity has emerged, challenging…

PoC Exploit Released for TP-Link Router Web Interface XSS Vulnerability
29
Jan
2025

PoC Exploit Released for TP-Link Router Web Interface XSS Vulnerability

A Cross-Site Scripting (XSS) vulnerability has been identified in the TP-Link Archer A20 v3 router, specifically in firmware version 1.0.6…

Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware
29
Jan
2025

Google Researchers Breakdowns Scatterbrain Behind PoisonPlug Malware

Google’s Threat Intelligence Group (GTIG) in collaboration with Mandiant has revealed critical insights into ScatterBrain, a sophisticated obfuscation tool utilized…

How Lazarus Group built a cyber espionage empire
29
Jan
2025

How Lazarus Group built a cyber espionage empire

Since September 2024, SecurityScorecard’s STRIKE team has been investigating Lazarus Group’s activity, uncovering key details about their infrastructure. Despite variations…

Fighting Cyber Threats: Microsoft’s New Security Focus
29
Jan
2025

Fighting Cyber Threats: Microsoft’s New Security Focus

The evolving cyber threat landscape of 2024 has highlighted the urgent need for a proactive and uncompromising security approach. As…

Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands
29
Jan
2025

Hackers Actively Exploiting Zyxel 0-day Vulnerability to Execute Arbitrary Commands

A significant zero-day vulnerability in Zyxel CPE series devices, identified as CVE-2024-40891, is being actively exploited by attackers. This vulnerability…

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely
29
Jan
2025

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been disclosed, with a proof-of-concept (PoC) exploit…

Hackerone logo
29
Jan
2025

Why This Moment In Cybersecurity Needs Hackers To Protect All Software

Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…

DeepSeek R1 Jailbroken to Generate Ransomware Development Scripts
29
Jan
2025

DeepSeek R1 Jailbroken to Generate Ransomware Development Scripts

DeepSeek R1, the latest AI model from China, is making waves in the tech world for its reasoning capabilities. Positioned…

Users Report Disruptions in Web Camera and USB Devices
29
Jan
2025

Users Report Disruptions in Web Camera and USB Devices

Windows 11 KB5050009 for version 24H2 has sparked widespread frustrations among users due to a slew of compatibility and functionality…

Hackers stolen $85 million worth of cryptocurrency from Phemex
29
Jan
2025

Hackers stolen $85 million worth of cryptocurrency from Phemex

Phemex, a cryptocurrency exchange based in Singapore, suffered a significant cyberattack that resulted in the theft of $85 million worth…