Nominet, the official registry for .uk domain names and one of the largest country code registries globally has disclosed a significant cybersecurity breach linked to a recently discovered zero-day vulnerability in Ivanti’s Virtual Private Network (VPN) software. The incident, which came to light in early January 2025, marks the first publicly confirmed case of exploitation related to the … [Read more...]
OneBlood Confirms Ransomware Attack – Donor’s Personal Information Stolen
OneBlood, a major blood donation nonprofit serving the southeastern United States, has confirmed a significant data breach resulting from a ransomware attack that occurred in July 2024. The organization, which provides blood to over 250 hospitals across Florida, Georgia, Alabama, and the Carolinas, disclosed that sensitive personal information of donors was compromised during the … [Read more...]
CISA Adds 2 New Known Vulnerabilities That Actively Exploited in The Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with two new critical vulnerabilities, urging organizations to act promptly to mitigate the risks. This catalog serves as the authoritative resource for vulnerabilities exploited in the wild, providing crucial guidance for organizations to prioritize their cybersecurity … [Read more...]
Rootkit Malware Exploiting 0-Day Vulnerabilities to Control Linux Systems Remotely
Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh). The analysis sheds new light on how attackers establish persistence, hijack network traffic, and remotely control compromised Linux-based systems using kernel modules and user-space processes. The investigation follows a … [Read more...]
New macOS Vulnerability Lets Attackers Bypass Apple’s System Integrity Protection (SIP)
Microsoft Threat Intelligence has identified a significant vulnerability in macOS that could allow attackers to bypass Apple’s System Integrity Protection (SIP), a critical security mechanism designed to safeguard the operating system from malicious interference. This flaw addressed as CVE-2024-44243, enables attackers to load third-party kernel extensions, potentially compromising macOS … [Read more...]
BeyondTrust Privileged Remote Access Vulnerability Actively Exploited in the Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical OS command injection vulnerability (CVE-2024-12686) found in BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) tools to its Known Exploited Vulnerabilities (KEV) catalog as this vulnerability has been actively exploited in the wild. Details of the Exploited Vulnerability The flaw, identified … [Read more...]
CISA Releases A New Free Guide For OT Products Security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has launched a new guidance document to enhance cybersecurity for operational technology (OT) products. The guide, titled “Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products”, is part of CISA’s ongoing Secure by Design and Secure by Default initiatives. It … [Read more...]
Telefonica Hacked: Attackers Allegedly Steal 2.3 GB Of Internal Data
Spanish telecommunications giant Telefonica has confirmed a significant breach of its internal systems, with attackers claiming to have stolen approximately 2.3 GB of sensitive data. The breach, which targeted the company’s Jira ticketing system, has exposed critical internal and customer-related information. Four individuals carried out the attack using aliases DNA, Grep, Pryx, and Rey. The … [Read more...]
Ako Ransomware Abusing Windows API Calls To Detect Infected System Locations
Ako, commonly referred to as MedusaReborn, is a C++-based ransomware strain that has been active since January 2020. It functions under the Ransomware-as-a-Service (RaaS) business model, enabling several adversaries to utilize it in exchange for a portion of their earnings from successful attacks. In contrast to many ransomware strains that target individual workstations, Ako maximizes its … [Read more...]
GPU Driver Vulnerabilities in Imagination Let Attackers Gain Kernel Access Remotely
Imagination Technologies, a leader in GPU innovation, has issued updates to address a series of critical vulnerabilities identified in its GPU driver software. Imagination Technologies is a global leader in developing GPUs, AI solutions, and semiconductor IP, powering applications across mobile, automotive, and consumer electronics. This year, the company celebrates the 30th anniversary of its … [Read more...]
Aviatrix Controller RCE Vulnerability Exploited In The Wild
A critical remote code execution (RCE) vulnerability, CVE-2024-50603, has been actively exploited in the wild, posing significant risks to cloud environments. This vulnerability affects Aviatrix Controller, a widely used cloud networking platform, and has been assigned the maximum CVSS score of 10.0 due to its severe impact and ease of exploitation. CVE-2024-50603 is a command injection flaw … [Read more...]
Microsoft Multi-Factor Authentication Down Blocking Office 365 Users Access
Microsoft has alerted users to an issue with its Multi-Factor Authentication (MFA) system, which has disrupted access to certain Microsoft 365 applications. The problem, identified earlier today, left some users unable to log in due to MFA failures. Microsoft has since taken steps to mitigate the issue by redirecting affected traffic, reporting that service availability is gradually … [Read more...]
Researchers Detailed ZAP Scanner’s Capabilities in Identifying Security Flaws
Researchers have conducted a detailed study on the capabilities of ZAP (Zed Attack Proxy), an open-source tool widely used for identifying vulnerabilities in web applications. The study, led by experts from National Tsing Hua University and the Industrial Technology Research Institute in Taiwan, evaluated the performance of ZAP versions 2.12.0 and 2.13.0 using the OWASP Benchmark, a … [Read more...]
Three Cryptomixer Masterminds Charged Processing Ransomware Payments
The U.S. Department of Justice (DoJ) has indicted three Russian nationals, Roman Vitalyevich Ostapenko, Alexander Evgenievich Oleynik, and Anton Vyachlavovich Tarasov, for their alleged roles in operating cryptocurrency mixing services Blender[.]io and Sinbad[.]io. These platforms are accused of laundering proceeds from ransomware attacks, cryptocurrency thefts, and other … [Read more...]
Hackers Exploiting YouTube to Deliver Malware Bypassing Antivirus Detections
Cybercriminals are increasingly leveraging YouTube’s vast platform to distribute malware, bypassing traditional antivirus detections and exploiting users’ trust in the popular video-sharing site. Security researchers have uncovered a sophisticated campaign where threat actors are hijacking YouTube channels and using them to spread info-stealing malware disguised as cracked software and game … [Read more...]
Critical macOS Sandbox Vulnerability (CVE-2024-54498) PoC Exploit Released Online
A proof-of-concept exploit was released for a critical vulnerability impacting macOS systems, identified as CVE-2024-54498. Security researcher @wh1te4ever recently revealed a proof-of-concept (PoC) exploit showcasing how the flaw allows malicious applications to escape the macOS Sandbox a security feature designed to confine app operations within designated boundaries. The PoC has … [Read more...]
33,542 Ivanti Connect Secure Instances Exposed as Exploitation of CVE-2025-0282 Unfolds
A critical security vulnerability, CVE-2025-0282, has been identified and exploited in the wild, affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways. This stack-based buffer overflow vulnerability, rated with a CVSS score of 9.0, allows unauthenticated attackers to execute arbitrary code remotely. The flaw impacts versions of Ivanti Connect Secure prior to … [Read more...]
100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect
Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis revealed that the malware employed a unique string encryption technique. The encryption method was identical to that used by Apple’s XProtect antivirus engine for encrypting YARA rules within its binaries. By leveraging this shared encryption … [Read more...]
Revolutionizing Cybersecurity: How Harold Teasdale Automates the Fight Against Insider Threats and Access Control Nightmares
Cybersecurity is no longer just about protecting systems from external attackers. In an increasingly digitized world, the greatest risks often lie within. Insider threats and the complexities of managing access controls present unique challenges to businesses of all sizes. Harold Teasdale, founder and Managing Director of XS Matrix, has emerged as a pioneer in addressing these issues through … [Read more...]
IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI
IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to cross-site scripting (XSS) attacks. The vulnerability, identified as CVE-2024-49785, affects both IBM watsonx.ai on Cloud Pak for Data and standalone IBM watsonx.ai installations. The security flaw allows authenticated users to embed arbitrary JavaScript code in the Web UI when using … [Read more...]
- 1
- 2
- 3
- …
- 50
- Next Page »