Tag: Cyber security news

Browse our exclusive articles!

Samsung Galaxy S25 0-Day Exploit Enables Camera Access and Tracking

At Pwn2Own Ireland 2025, cybersecurity researchers Ben R. and Georgi G. from Interrupt Labs achieved a significant breakthrough by successfully exploiting a zero-day vulnerability...

Access Token Theft Lets Hackers Read Teams Chats and Emails

A critical vulnerability in how Microsoft Teams stores authentication data has exposed organizations to a dangerous new attack. Security researchers have discovered that attackers...

Perplexity Comet Browser Flaw Allows Attackers to Inject Malicious Prompts

Security researchers from Brave have uncovered a critical vulnerability in Perplexity's Comet AI browser that allows attackers to inject malicious commands through hidden text...

Hackers Exploit Magento, Adobe Commerce RCE to Deploy Webshells

Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236 and dubbed SessionReaper, enables remote...

Critical Jira Vulnerability Enables Arbitrary File Modification via JVM Access

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers to modify files accessible...

Popular

Apple’s iOS 26 Removes Pegasus and Predator Spyware Evidence by Replacing the ‘shutdown.log’ File

Apple's latest operating system update, iOS 26, inadvertently introduces...

Vulnerabilities in HashiCorp Vault Allow Attackers to Bypass Authentication and Launch DoS Attack

HashiCorp has disclosed a critical, unauthenticated denial-of-service vulnerability in...

New EDR-Redir Tool Bypasses EDR via Bind and Cloud Filter Drivers

A cybersecurity researcher has unveiled EDR-Redir, a new tool...

Critical Dell Storage Manager Bugs Enable Remote System Compromise

Dell Technologies has disclosed three critical vulnerabilities in its...

Subscribe

spot_imgspot_img