Operation Serengeti 2.0
22
Aug
2025

Operation Serengeti 2.0: 1,200 Arrested, Millions Seized

An INTERPOL-coordinated operation, dubbed Operation Serengeti 2.0, delivered a telling blow to cybercrime across the African continent. The operation that…

Windows
22
Aug
2025

August Windows updates cause severe streaming issues

Microsoft has confirmed that the August 2025 security updates are causing severe lag and stuttering issues with NDI streaming software…

Windows Docker Desktop Vulnerability Leads to Full Host Compromise
22
Aug
2025

Windows Docker Desktop Vulnerability Leads to Full Host Compromise

A newly disclosed vulnerability in Docker Desktop for Windows has revealed how a simple Server-Side Request Forgery (SSRF) attack could…

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS
22
Aug
2025

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability affecting Apple iOS,…

Automation Is Redefining Pentest Delivery
22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes
22
Aug
2025

Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes

The Anatsa banking trojan, also known as TeaBot, continues to evolve as one of the most sophisticated Android malware threats…

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes
22
Aug
2025

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes

Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Exploiting API4 — 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them) — API Security

Unrestricted Resource Consumption (API4:2023) is the only threat category in the OWASP API Security Top 10 explicitly dedicated to Denial…

Azure's Default API Connection Vulnerability Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure’s Default API Connection Vulnerability Enables Full Cross-Tenant Compromise

A critical vulnerability in Microsoft Azure’s API Connection infrastructure enabled attackers to compromise resources across different Azure tenants worldwide.  The…

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
22
Aug
2025

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools

Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…