GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
24
Feb
2025

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in…

week in security
24
Feb
2025

A week in security (February 17 – February 23)

February 21, 2025 – Healthcare security is failing patients time and again. This week DM Clinical Research and Helath Net…

Parallels Desktop 0-Day Vulnerability Gain Root Privileges
24
Feb
2025

Parallels Desktop 0-Day Vulnerability Gain Root Privileges

A critical 0-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed, enabling local attackers to escalate privileges to…

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials
24
Feb
2025

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting users with fraudulent payment requests to…

Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries
24
Feb
2025

Exim Mail Transfer Vulnerability Let Attackers Inject Malicious SQL Queries

Security researchers have uncovered a critical SQL injection vulnerability (CVE-2025-26794) in Exim, the widely-used mail transfer agent (MTA) that powers…

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability
24
Feb
2025

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP Traffic Management Shell (TMSH) command-line interface….

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released
24
Feb
2025

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling…

Naveen Goud
24
Feb
2025

US Satellites enabled with AI Tech to make them immune to Cyber Attacks

China has emerged as one of the primary geopolitical and technological adversaries of the United States, a fact widely acknowledged…

UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks
24
Feb
2025

UniFi Protect Camera Vulnerability Allows Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory addressing five critical vulnerabilities in its UniFi Protect camera ecosystem, including two…

Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
24
Feb
2025

Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL

A newly disclosed vulnerability in the Exim mail transfer agent (CVE-2025-26794) has sent shockwaves through the cybersecurity community, revealing a…

Naveen Goud
24
Feb
2025

How Password Managers Enhance Security in Corporate Networks

In the digital age, corporate networks face an ever-growing number of cybersecurity threats, making password management a critical component of…

24
Feb
2025

Man vs. machine: Striking the perfect balance in threat intelligence

In this Help Net Security interview, Aaron Roberts, Director at Perspective Intelligence, discusses how automation is reshaping threat intelligence. He…