Details AMD Zen Processor Vulnerability 
10
Mar
2025

Bug Hunters Investigate AMD Zen Processor Vulnerability

A recent vulnerability analysis made by the Google Bug Hunters team reveals an important flaw in the microcode signature validation…

1 Million Devices Infected by Malwares Hosted on GitHub, Microsoft Warns
10
Mar
2025

1 Million Devices Infected by Malwares Hosted on GitHub, Microsoft Warns

Microsoft Threat Intelligence detected a large-scale malvertising campaign in early December 2024 that infected nearly one million devices globally in…

Thinkware Dashcam Vulnerability Leaks Credentials to Attackers
10
Mar
2025

Thinkware Dashcam Vulnerability Leaks Credentials to Attackers

A series of significant security vulnerabilities have been discovered in the Thinkware Dashcam, specifically the F800 Pro model, which could…

10
Mar
2025

March 2025 Patch Tuesday forecast: A return to normalcy

The February Patch Tuesday updates and activity during the month marked a return to normalcy for patch management. Following the…

Commvault Webserver Flaw Allows Attackers to Gain Full Control
10
Mar
2025

Commvault Webserver Flaw Allows Attackers to Gain Full Control

Commvault has revealed a major vulnerability in its software that could allow malicious actors to gain full control of its…

Naveen Goud
10
Mar
2025

Why software upgrades on Smart Phones matters in Cybersecurity POV

In today’s world, smartphones have evolved from luxury gadgets to essential tools that we rely on for a variety of…

10
Mar
2025

Hetty: Open-source HTTP toolkit for security research

Hetty is an open-source HTTP toolkit designed for security research, offering a free alternative to commercial tools like Burp Suite…

New Apache Traffic Server Flaws Allow Malformed Request Exploits
10
Mar
2025

New Apache Traffic Server Flaws Allow Malformed Request Exploits

The Apache Software Foundation has disclosed several vulnerabilities affecting its Traffic Server software. These vulnerabilities allow malicious actors to exploit…

Naveen Goud
10
Mar
2025

Understanding Operational Technology Cyber Attacks: The Emerging Threat to Critical Infrastructure

In today’s hyper-connected world, the Internet of Things (IoT) and digital technologies have revolutionized industries across the globe. However, with…

10
Mar
2025

How to safely dispose of old tech without leaving a security risk

Every year, millions of old tech are thrown away due to age, malfunctions, or to make way for new ones,…

Over 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw
10
Mar
2025

Over 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw

A significant vulnerability has been uncovered in the Python JSON Logger package (python-json-logger), affecting versions 3.2.0 and 3.2.1. This flaw,…

SilentCryptoMiner Malware
10
Mar
2025

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

Mar 10, 2025Ravie LakshmananThreat Intelligence / Cybercrime A new mass malware campaign is infecting users with a cryptocurrency miner named…