Latest Articles

Sitevision

Sitevision Auto-Generated Password Vulnerability Expose Signing Key to Hackers

A critical vulnerability in Sitevision CMS, identified as CVE-2022-35202, has been discovered, potentially exposing private signing keys used for SAML authentication. The flaw, present...
CL0P Ransomware

Widespread CL0P Ransomware Attacks Disrupt Telecommunications and Healthcare

The CL0P ransomware group, a notorious cybercriminal organization active since 2019, has launched a new wave of attacks targeting key sectors such as telecommunications...
Financial Institutions

Adversary-in-the-Middle Cybercriminals Attack Financial Institutions Using Sophisticated Exploits

Cybercriminal groups have escalated their attacks on financial institutions, employing advanced adversary-in-the-middle (AiTM) techniques to compromise sensitive systems. These sophisticated exploits leverage vulnerabilities in...
SPAWNCHIMERA Malware

SPAWNCHIMERA Malware Exploits and Patches The Ivanti VPN Vulnerability Itself

In a concerning development, the SPAWNCHIMERA malware family has been confirmed to exploit a critical vulnerability in Ivanti Connect Secure VPN (CVE-2025-0282) while simultaneously...
Dell

Dell Recover Point for Virtual Machines Vulnerabilities Allows Privilege Escalation

Dell Technologies has issued a security advisory regarding multiple vulnerabilities in its RecoverPoint for Virtual Machines (RP4VM) software. These vulnerabilities could potentially allow low-privileged...
Ivanti EPM Flaws

Proof-of-Concept Exploit Published for Critical Ivanti EPM Flaws

A recent investigation by Horizon3.ai has unveiled four critical vulnerabilities in the Ivanti Endpoint Manager (EPM). These vulnerabilities, identified as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159,...
software

Hackers Delivering Malware to Compromise Freelance Software Developers Systems

In a troubling trend observed by cybersecurity experts, hackers are increasingly targeting freelance software developers through deceptive recruitment tactics. ESET researchers have identified a...
Bookworm Malware

New Bookworm Malware Exploits DLL Sideloading to Attack Windows Systems

A recent analysis by Unit 42 has revealed that the Stately Taurus threat group has been leveraging a variant of the Bookworm malware to...
ShadowPad Malware

ShadowPad Malware Upgrade Enables Stealthy Ransomware Deployment

In a concerning development, cybersecurity researchers have identified an upgraded version of the ShadowPad malware being used in ransomware attacks across multiple industries and...
Job Scam

North Korean Job Scam Spreads Malware Through Fake Chrome Update

In a sophisticated cyber-espionage campaign, North Korean threat actors have been leveraging fake job interview processes to deploy malware disguised as legitimate applications. According...

Cyber Security Headlines

Cyber Attacks

Widespread CL0P Ransomware Attacks Disrupt Telecommunications and Healthcare

The CL0P ransomware group, a notorious cybercriminal organization active since 2019, has launched a new wave of attacks...

Adversary-in-the-Middle Cybercriminals Attack Financial Institutions Using Sophisticated Exploits

Cybercriminal groups have escalated their attacks on financial institutions, employing advanced adversary-in-the-middle (AiTM) techniques to compromise sensitive systems....

Data Breach

Cybercriminals Use $10 Infostealer Malware to Breach US Security Systems

A recent cybersecurity report has revealed a critical vulnerability in the U.S. defense and government sectors. For as little as $10 per...

Cyber AI

New AI-Powered Mirai Botnet Unleashes Unstoppable Large-Scale DDoS Attacks

The Mirai botnet is actively exploiting known web vulnerabilities to compromise over 1,200 sites across 780 customer accounts, as researchers have identified...