Semiconductor company is investigating a potential data breach | Cybernews
05
Feb
2025

Semiconductor company is investigating a potential data breach | Cybernews

RansomHouse gang claims to have stolen over 450GB from AMD semiconductor company. “On June 27, we became aware that a…

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access
05
Feb
2025

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access

In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…

Naveen Goud
05
Feb
2025

NSA asks iPhone users to use flap covers to banish privacy concerns

National Security Agency (NSA) of the United States, primarily known for its intelligence-gathering and surveillance activities in the name of…

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
05
Feb
2025

CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database
05
Feb
2025

CISA Adds Apache, Microsoft Bugs to Know Exploited Vulnerabilities Database

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…

Dutch university recovered ransomware payment with a $300k profit | Cybernews
05
Feb
2025

Dutch university recovered ransomware payment with a $300k profit | Cybernews

Even though the authorities recovered only a fraction of the payment made in Bitcoin three years ago, the victim made…

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

Is voice recognition another biometric surveillance tool? | Cybernews
05
Feb
2025

Is voice recognition another biometric surveillance tool? | Cybernews

Considering the alarm bells around biometric surveillance tech, should we be concerned about the popularity of voice technology? In 2002,…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

05
Feb
2025

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….

North Korea backing healthcare ransom attacks in US
05
Feb
2025

North Korea backing healthcare ransom attacks in US

Cybercriminal groups linked to the rogue state have been using Maui ransomware to attack healthcare and public health organizations in…

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code
05
Feb
2025

Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code

The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux….