Cisco has released fixes for two critical vulnerabilities (CVE-2025-20124 and CVE-2025-20125) in its Identity Services Engine (ISE) platform, a widely [...]
A Chinese cyber-espionage group, Evasive Panda (also known as DaggerFly), has been using a newly discovered SSH backdoor, "ELF/Sshdinjector.A!tr," to [...]
As part of its November security updates, Google patched two Android zero-day vulnerabilities, CVE-2024-43047 and CVE-2024-43093, both actively exploited in [...]
Google's Threat Intelligence Group (GTIG) has identified government-backed APT groups from over 20 countries, including Iran, China, North Korea, and [...]
Akamai researchers have identified Aquabotv3, a new variant of the Mirai-based botnet malware, exploiting the CVE-2024-41710 vulnerability in Mitel SIP [...]
A high-severity vulnerability in 7-Zip (CVE-2025-0411) allowed attackers to bypass Windows' Mark of the Web (MotW) security mechanism, enabling the [...]
Hewlett Packard Enterprise (HPE) is probing allegations by threat actor IntelBroker, who claims to have accessed the company’s developer environments [...]
A new vulnerability, CVE-2024-7344, has been discovered in UEFI Secure Boot, affecting Microsoft-signed applications in third-party system recovery tools. The [...]
A fraudulent proof-of-concept (PoC) exploit for the LDAPNightmare vulnerability (CVE-2024-49113) has been circulating on GitHub, secretly deploying infostealer malware that [...]
Cybercriminals are exploiting CVE-2024-52875, a critical CRLF injection flaw in GFI KerioControl firewalls, to execute remote code and steal sensitive [...]
A new Mirai-based botnet is actively targeting vulnerabilities in DigiEver DS-2105 Pro NVRs and outdated TP-Link routers, exploiting a previously [...]
Two WordPress plugins required for the popular WPLMS learning management system (LMS) theme, used by educational and corporate organizations, were [...]
The phishing-as-a-service (PhaaS) platform "FlowerStorm" has gained traction after the Rockstar2FA service suffered a partial collapse in November 2024. Rockstar2FA [...]
A large-scale malvertising campaign, dubbed DeceptionAds, has been distributing the Lumma Stealer malware by tricking users into running malicious PowerShell [...]
The newly discovered Pumakit Linux rootkit uses advanced stealth techniques and privilege escalation to compromise systems while avoiding detection. Identified [...]
Researchers at Lookout have uncovered a previously unknown Android spyware, dubbed EagleMsgSpy, reportedly used by Chinese law enforcement to monitor [...]
Zabbix, a leading provider of open-source network and application monitoring tools, has disclosed a critical SQL injection vulnerability (CVE-2024-42327) that [...]
ESET researchers have identified Bootkitty, the first UEFI bootkit specifically designed to target Linux systems, signaling an evolution in bootkit [...]