Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices
05
Mar
2025

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices

A newly documented exploitation technique targeting Telegram’s file-sharing infrastructure has raised alarms in cybersecurity circles. Dubbed “EvilVideo,” this attack vector…

LinkedIn Phishing Scam: Fake InMail Messages Spreading ConnectWise Trojan
05
Mar
2025

Fake InMail Messages Spreading ConnectWise Trojan

Cofense uncovers new LinkedIn phishing scam delivering ConnectWise RAT. Learn how attackers bypass security with fake InMail emails and how…

Polish Space Agency POLSA disconnected its network following a cyberattack
05
Mar
2025

Polish Space Agency POLSA disconnected its network following a cyberattack

Polish Space Agency POLSA disconnected its network following a cyberattack Pierluigi Paganini March 05, 2025 The Polish space agency POLSA…

05
Mar
2025

Sonatype AI SCA delivers visibility and control over AI/ML usage

Sonatype announced end-to-end AI Software Composition Analysis (AI SCA) capabilities that enable enterprises to harness the full potential of AI….

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access
05
Mar
2025

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access

A critical security flaw in Zoho’s widely used identity management solution, ADSelfService Plus, has been patched after researchers discovered it…

Brunei Cybersecurity
05
Mar
2025

Brunei Blocks 82 Scam Websites, 557 Fraud Numbers

Brunei has raged up its efforts to fight cyber threats and online scams, with Minister of Transport and Infocommunications Yang…

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution
05
Mar
2025

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution

Security researchers have released proof-of-concept (PoC) exploit code for critical vulnerabilities in Hewlett Packard Enterprise’s (HPE) Insight Remote Support (IRS)…

Malware on Linux and macOS Systems
05
Mar
2025

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Mar 05, 2025Ravie LakshmananOpen Source / Malware Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem…

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover
05
Mar
2025

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover

A recently patched remote code execution (RCE) vulnerability in Microsoft Windows’ Key Distribution Center (KDC) Proxy implementation allows unauthenticated attackers…

Naveen Goud
05
Mar
2025

DDoS Attack on Beeline Russia

Beeline, one of Russia’s largest telecommunications providers, recently experienced a significant cyber attack, which experts believe to be a Distributed…

U.S. CISA adds Linux kernel and VMware ESXi and Workstation flaws to its Known Exploited Vulnerabilities catalog
05
Mar
2025

U.S. CISA adds Linux kernel and VMware ESXi and Workstation flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Linux kernel and VMware ESXi and Workstation flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 05,…

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
05
Mar
2025

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities

Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws…