Pwn2Own Automotive Tokyo
24
Jan
2025

Hackers get $886,250 for 49 zero-days at Pwn2Own Automotive 2025

​The Pwn2Own Automotive 2025 hacking contest has ended with security researchers collecting $886,250 after exploiting 49 zero-days. Throughout the event,…

New Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detection
24
Jan
2025

New Ransomware Attacking VMware ESXi Hosts Via SSH Tunneling to Evade Detection

New ransomware strains are quietly infiltrating VMware ESXi hosts by setting up SSH tunnels and concealing malicious traffic within legitimate…

Tagged Files as a Road to Insider Threats
24
Jan
2025

Tagged Files as a Road to Insider Threats

The insider threat is any individual within community who does something against such surrounding even being used for sabotage, diversion,…

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights
24
Jan
2025

Android Kisok Tablets Vulnerability Let Attackers Control AC & Lights

A startling security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave vulnerability, potentially allowing attackers…

phpMyAdmin Vulnerability Let Hackers Trigger XSS Attack With Malicious Tables
24
Jan
2025

phpMyAdmin Vulnerability Let Hackers Trigger XSS Attack With Malicious Tables

A moderate-severity Cross-Site Scripting (XSS) vulnerability has been identified in phpMyAdmin, a widely used open-source tool for managing MySQL databases. …

Server Configurations and TLS Certificates Revealed
24
Jan
2025

Server Configurations and TLS Certificates Revealed

In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a suspected Chinese state-backed cyber actor…

High Court: Sky Betting ‘parasitic’ in targeting problem gambler
24
Jan
2025

High Court: Sky Betting ‘parasitic’ in targeting problem gambler

A recovering gambling addict has won his case against Sky Betting & Gaming (SBG) in the UK High Court, which…

Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level
24
Jan
2025

Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level

Adversaries continue to innovate methods to bypass Endpoint Detection and Response (EDR) systems. An exceptionally sophisticated approach involves leveraging hardware…

CISA Releases Six ICS Advisories Details Security Issues
24
Jan
2025

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories addressing vulnerabilities in a range…

Review of legal rule on computer evidence long overdue, say Post Office scandal victims
24
Jan
2025

Review of legal rule on computer evidence long overdue, say Post Office scandal victims

Nearly 1,000 people were wrongly convicted of crimes based on flawed evidence from a computer system used in Post Offices,…

North Korean IT Workers Demands Ransomware By Stealing Companies Source Codes 
24
Jan
2025

North Korean IT Workers Demands Ransomware By Stealing Companies Source Codes 

North Korean IT workers masquerading as remote workers have been breaking into Western companies, stealing confidential source codes, and requesting…

Beware of Fake Captcha Verifications Spreading Lumma Malware
24
Jan
2025

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages to deliver the Lumma Stealer…