Cybersecurity Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone by Cyber Security February 28, 2025 1.3k
Cybersecurity Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme February 28, 2025 1.3k
Cybersecurity 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals February 27, 2025 1.3k
Cybersecurity Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads February 26, 2025 1.4k
Cybersecurity Three Password Cracking Techniques and How to Defend Against Them February 26, 2025 1.3k
Cybersecurity Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions February 11, 2025 1.3k
Cybersecurity Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores February 10, 2025 1.3k
Cybersecurity Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities February 10, 2025 1.3k
Cybersecurity XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells February 10, 2025 1.3k
Cybersecurity Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection February 8, 2025 1.3k
Cybersecurity CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability February 7, 2025 1.3k
Cybersecurity Microsoft Identifies 3,000+ Publicly Disclosed ASP.NET Machine Keys Vulnerable to Code Injection February 7, 2025 1.3k
Cybersecurity India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud February 7, 2025 1.3k
Cybersecurity Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware February 7, 2025 1.3k
Cybersecurity North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials February 6, 2025 1.3k
Cybersecurity Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc February 6, 2025 1.3k
Cybersecurity Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks February 5, 2025 1.3k
Cybersecurity Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts February 5, 2025 1.3k
Cybersecurity New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack February 5, 2025 1.3k
Cybersecurity Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access February 4, 2025 1.3k
Cybersecurity Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections February 4, 2025 1.3k
Cybersecurity AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access February 4, 2025 1.3k
Cybersecurity Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform February 3, 2025 1.3k
Cybersecurity 768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 February 3, 2025 1.3k
Cybersecurity PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages February 3, 2025 1.3k