A high-severity vulnerability in 7-Zip (CVE-2025-0411) allowed attackers to bypass Windows' Mark of the Web (MotW) security mechanism, enabling the [...]
Hewlett Packard Enterprise (HPE) is probing allegations by threat actor IntelBroker, who claims to have accessed the company’s developer environments [...]
A new vulnerability, CVE-2024-7344, has been discovered in UEFI Secure Boot, affecting Microsoft-signed applications in third-party system recovery tools. The [...]
A fraudulent proof-of-concept (PoC) exploit for the LDAPNightmare vulnerability (CVE-2024-49113) has been circulating on GitHub, secretly deploying infostealer malware that [...]
Cybercriminals are exploiting CVE-2024-52875, a critical CRLF injection flaw in GFI KerioControl firewalls, to execute remote code and steal sensitive [...]
A new Mirai-based botnet is actively targeting vulnerabilities in DigiEver DS-2105 Pro NVRs and outdated TP-Link routers, exploiting a previously [...]
Two WordPress plugins required for the popular WPLMS learning management system (LMS) theme, used by educational and corporate organizations, were [...]
The phishing-as-a-service (PhaaS) platform "FlowerStorm" has gained traction after the Rockstar2FA service suffered a partial collapse in November 2024. Rockstar2FA [...]
A large-scale malvertising campaign, dubbed DeceptionAds, has been distributing the Lumma Stealer malware by tricking users into running malicious PowerShell [...]
The newly discovered Pumakit Linux rootkit uses advanced stealth techniques and privilege escalation to compromise systems while avoiding detection. Identified [...]
Researchers at Lookout have uncovered a previously unknown Android spyware, dubbed EagleMsgSpy, reportedly used by Chinese law enforcement to monitor [...]
Zabbix, a leading provider of open-source network and application monitoring tools, has disclosed a critical SQL injection vulnerability (CVE-2024-42327) that [...]
ESET researchers have identified Bootkitty, the first UEFI bootkit specifically designed to target Linux systems, signaling an evolution in bootkit [...]
Researchers from AmberWolf have identified vulnerabilities, collectively named "NachoVPN," in SonicWall and Palo Alto SSL-VPN clients. These flaws allow attacker-controlled [...]
Five local privilege escalation (LPE) vulnerabilities, present in Ubuntu’s needrestart utility since 2014, were discovered by Qualys and recently patched [...]
Apple has issued emergency updates to address two actively exploited zero-day vulnerabilities affecting Intel-based Mac systems. The flaws, CVE-2024-44308 and [...]
Cybercriminals are increasingly leveraging Scalable Vector Graphics (SVG) files in phishing emails to display fake login forms or deliver malware [...]
A severe authentication bypass vulnerability, CVE-2024-10924, has been found in the WordPress plugin "Really Simple Security" (formerly "Really Simple SSL"). [...]