Windows Flaw CVE-2025-24054 Actively Exploited to Steal NTLM Passwords
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new Windows security flaw, CVE-2025-24054, to its Known Exploited […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new Windows security flaw, CVE-2025-24054, to its Known Exploited […]
A critical security vulnerability has been discovered in Apache Roller, a widely used open-source Java-based blogging server, which puts websites
A well-known hacker group named SideCopy APT is targeting Indian government ministries and critical infrastructure with dangerous cyberattacks. According to
Google has finally addressed a major privacy flaw in its Chrome browser that allowed websites to track a user’s browsing
Microsoft is rolling out a new security feature in its Defender for Endpoint platform designed to block cyberattacks before they
A serious security vulnerability in the popular OttoKit WordPress plugin (formerly known as SureTriggers) is being actively exploited by hackers
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious security vulnerability affecting Gladinet CentreStack,
Fortinet, a global leader in cybersecurity solutions, has issued an urgent warning to all users of its FortiSwitch products. The
Google has rolled out its April 2025 Android security update, fixing a total of 62 vulnerabilities, including two high-severity flaws
A large-scale cryptojacking campaign has been discovered using malicious Visual Studio Code (VS Code) extensions. According to cybersecurity researchers at
Ivanti has rolled out important security patches for a serious vulnerability in its Connect Secure VPN appliances. The flaw, tracked
A recent GitHub supply chain attack that initially impacted Coinbase has now been traced back to a deeper issue: the
A maximum severity remote code execution (RCE) vulnerability has been identified in Apache Parquet, affecting all versions up to and
Cybersecurity researchers have uncovered an updated version of the malware loader known as Hijack Loader, which incorporates advanced techniques to
Cybercriminals are actively exploiting misconfigured PostgreSQL servers to deploy a fileless cryptominer, with over 1,500 systems compromised. Security researchers at