New FireScam Android Malware Abusing Firebase Services To Evade Detection
06
Jan
2025

New FireScam Android Malware Abusing Firebase Services To Evade Detection

FireScam, an information stealer malware with spyware capabilities, is being disseminated as a fake “Telegram Premium” application. The malware spreads…

Open Source LLM Vulnerability Scanner for AI Red-Teaming
06
Jan
2025

Open Source LLM Vulnerability Scanner for AI Red-Teaming

Garak is a free, open-source tool specifically designed to test the robustness and reliability of Large Language Models (LLMs). Inspired…

10 Best Cybersecurity Certifications For 2025 Career Growth
06
Jan
2025

10 Best Cybersecurity Certifications For 2025 Career Growth

Cybersecurity professionals are the frontline warriors combating hackers, hacktivists, and ransomware groups. To fight with these cyber criminals, the world…

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)
06
Jan
2025

PoC Exploit Released for Critical OpenSSH Vulnerability (CVE-2024-6387)

An alarming new development emerged in the cybersecurity landscape with the release of a proof-of-concept (PoC) exploit targeting the critical…

EAGERBEE Malware Expands Arsenal With Advanced Payloads And Command Shells
06
Jan
2025

EAGERBEE Malware Expands Arsenal With Advanced Payloads & Command Shells

The EAGERBEE malware, a sophisticated backdoor previously linked to cyberespionage campaigns in the Middle East and Southeast Asia, has undergone…

Malicious npm Packages Stealing Developers' Sensitive Data
06
Jan
2025

Malicious npm Packages Stealing Developers’ Sensitive Data

Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these packages, downloaded over 1,000 times,…

How Toyota is transforming its digital employee experience
06
Jan
2025

How Toyota is transforming its digital employee experience

Toyota, one of the world’s largest car manufacturers, has embarked on a project to transform its digital employee experience (DEX)….

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability
06
Jan
2025

PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability

A proof-of-concept (PoC) exploit for the critical OpenSSH vulnerability CVE-2024-6387, also known as “regreSSHion,” has been released, raising alarms across…

Wordpress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks
06
Jan
2025

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration Plugin, potentially impacting over 3 million…

6 Reasons Why You Should Integrate AI in Your Business in 2025 
06
Jan
2025

6 Reasons Why You Should Integrate AI in Your Business in 2025 

AI is now essential for businesses, driving efficiency, innovation, and growth. Leverage its power for better decisions, customer personalization, and…

Ethereum Devs
06
Jan
2025

Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

Jan 06, 2025Ravie LakshmananBlockchain / Malware Cybersecurity researchers have revealed several malicious packages on the npm registry that have been…

Revised NHS App key to tackling waiting list
06
Jan
2025

Revised NHS App key to tackling waiting list

A revised NHS app will form a key part of the government’s Elective Reform Plan to address the NHS waiting…