CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation by the XE Group. […]
Category: Cyber Security News
Google Pays Out Nearly $12M in 2024 Bug Bounty Program
The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories. ​The original article found […]
North Korean Hackers Weaponizing ZIP Files To Execute Malicious PowerShell Scripts
Security researchers have identified a sophisticated attack campaign attributed to APT37, a North Korean state-sponsored hacking group also known as ScarCruft, Reaper, and Red Eyes. […]
Apple iOS 18.4 Beta 3 Released – New Features, Enhancements, and What to Expect
Apple has taken another step toward the official release of iOS 18.4 by seeding the third developer beta of the update to testers late on […]
Researcher Hacked Embedded Devices To Extract The Firmware
A security researcher known as newp1ayer48 has successfully demonstrated a method to extract firmware from IoT and embedded devices using direct Flash Memory dumps, providing […]
10 Best IT Systems Management Tools – 2025
IT systems management tools are essential for organizations to monitor, manage, and optimize their IT infrastructure effectively. These tools provide comprehensive solutions for handling networks, […]
APT ‘Blind Eagle’ Targets Colombian Government
The South American-based advanced persistent threat group is using an exploit with a “high infection rate,” according to research from Check Point. ​The original article […]
Ex-Employee Found Guilty in Revenge Kill-Switch Scheme
Clandestine kill switch was designed to lock out other users if the developer’s account in the company’s Windows Active Directory was ever disabled. ​The original […]
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. “The polymorphic extensions create a pixel […]
GitHub-Hosted Malware Infects 1M Windows Users
Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the […]