Cybersecurity News

Multiple Dell Unity Vulnerabilities Let Attackers Compr...

Dell Technologies has released a critical security update addressing multiple se...

New Ubuntu Security Bypasses Allow Attackers to Exploit...

Three critical bypasses in Ubuntu Linux’s unprivileged user namespace restrictio...

Hewlett Packard RCE Vulnerability Allows Attackers to B...

A critical unauthenticated remote code execution vulnerability (CVE-2024-13804) ...

Earth Alux Hackers Employ VARGIET Malware to Attack Org...

The cybersecurity landscape has been disrupted by Earth Alux, a China-linked adv...

ClickFake Interview – Lazarus Hackers Exploit Windows a...

The Lazarus Group, a North Korean state-sponsored hacking collective, has launch...

DarkCloud – An Advanced Stealer Malware Selling Via Tel...

DarkCloud is a sophisticated stealer malware that emerged in 2022, quickly posit...

Microsoft Removes bypassnro.cmd in Windows 11 Insider T...

Microsoft has taken a decisive step in its latest Windows 11 Insider Preview Bui...

20 Best Remote Monitoring Tools – 2025

Remote monitoring tools are essential for managing and maintaining the health an...

Critical PHP Vulnerability Let Hackers Bypass the Valid...

A critical vulnerability in PHP’s libxml streams has been identified, potentiall...

TsarBot Android Malware Mimics 750 Banking & Finance Ap...

A newly discovered Android banking malware named TsarBot is targeting over 750 a...

Apache Tomcat Vulnerability (CVE-2025-24813) Exploited ...

A critical vulnerability in Apache Tomcat has been actively exploited by attacke...

Hackers Employ New ClickFix Captcha Technique to Delive...

A sophisticated social engineering technique known as ClickFix has emerged, leve...

Lotus Blossom APT Exploits WMI for Post-Exploitation Ac...

The Lotus Blossom Advanced Persistent Threat (APT) group, also known as Lotus Pa...

CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vuln...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Malware...

RamiGPT – AI Tool To Escalate Privilege & Gain Root Acc...

A new AI-driven offensive security tool, RamiGPT, is known for its ability to au...

ClickFix Captcha – A Creative Technique That Allow Atta...

A sophisticated social engineering technique has recently emerged in the cyberse...

Gamaredon Hacker Group Using Weaponize LNK Files To Dro...

A sophisticated cyber espionage campaign targeting Ukrainian entities has been u...

46 New Vulnerabilities in Solar Inverters Systems Let A...

Researchers have uncovered critical security flaws in global solar power infrast...

DeBackdoor – Framework to Detect Backdoor Attacks on De...

In an era where deep learning models increasingly power critical systems from se...

Red Team Activities Turns More Sophisticated With The P...

Artificial intelligence has dramatically transformed the cybersecurity landscape...

SquareX Discloses Browser-Native Ransomware that Puts M...

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damagi...

Hackers Leveraging DNS MX Records To Dynamically Create...

A sophisticated phishing operation has emerged that creatively leverages DNS mai...

Crocodilus – A New Android Malware Remotely Control You...

Researchers has identified a novel mobile banking Trojan, designated “Crocodilus...

Fake Snow White Movie Attacking Viewers Device With New...

Disney’s latest release, Snow White (2025), has turned into a cybersecurity cris...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.