cybersecuritynews.com

RansomHub Affiliate Deploying New Custom Backdoor Dubbe...

A RansomHub affiliate has been observed recently deploying a new custom backdoor...

New Steganographic Malware Exploits JPEG Files to Distr...

A sophisticated malware campaign employing steganographic techniques has recentl...

Hackers Exploiting Multiple Cisco Smart Licensing Utili...

Researchers have detected active exploitation attempts targeting two critical vu...

IBM AIX Vulnerability Let Attackers Execute Arbitrary C...

Critical security vulnerabilities in IBM AIX operating systems could allow unaut...

Rooted (Jailbroken) Mobile Devices 3.5 Times More Vulne...

A recent study has revealed that rooted devices are over 3.5 times more likely t...

Kali Linux 2025.1a Released With New Tool & Updates to ...

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has offici...

Threat Actors Exploiting Legacy Drivers to Bypass TLS C...

A sophisticated attack employing Legacy Driver Exploitation technique has emerge...

ANY.RUN’s New Android OS Support Let SOC/DFIR Team Perf...

ANY.RUN, the interactive malware analysis platform has announced full support fo...

Hackers Leveraging RMM Tools To Maintain Persistence To...

Cybersecurity experts have identified a persistent trend of threat actors exploi...

SecPod launches Saner Cloud: A Revolutionary CNAPP For ...

Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud...

Kali Linux 2025.1a New Tool & Upates to Desktop Environ...

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has offici...

Sophisticated Attack Via Booking Websites Installs Lumm...

Cybercriminals have launched a new sophisticated attack campaign targeting trave...

VPN Vulnerabilities Emerges As The Key Tool for Threat ...

VPN infrastructure has become a prime target for cybercriminals and state-sponso...

Hacker Weaponizing Hard Disk Image Files To Deliver Ven...

A sophisticated phishing campaign is leveraging virtual hard disk (.vhd) files t...

Hackers Allegedly Selling Firewall Access to Canon Inc ...

Threat actors are allegedly offering root access to Canon Inc.’s internal firewa...

Microsoft Windows File Explorer Vulnerability Let Attac...

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071,...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.