Cyber News

Researchers Exploit 0-Day Vulnerability in Google kernelCTF and Debian 12

Security researchers have successfully exploited a critical zero-day vulnerability in the Linux kernel, compromising multiple Google kernelCTF instances and Debian…

9 months ago

LARGEST EVER Bitcoin Hack Valued $3.5 Billion Uncovered

On August 2, 2025, blockchain analytics firm Arkham Intelligence revealed that Chinese mining pool LuBian suffered what appears to be…

9 months ago

Government Agencies at Risk Due to Vulnerabilities in Partner Software

A critical vulnerabilities in Partner Software and Partner Web applications that pose significant risks to government agencies and municipal organizations…

9 months ago

Cursor IDE Vulnerability Exposes Users to Remote Code Execution

A critical security vulnerability in the popular AI-powered code editor Cursor IDE has been disclosed that allows attackers to execute…

9 months ago

Critical Squid Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability in the widely-used Squid proxy server has been discovered that could allow attackers to execute remote…

9 months ago

Critical HashiCorp Vulnerability Enables Host-Level Code Execution

HashiCorp has issued a high-severity advisory (HCSEC-2025-14) detailing CVE-2025-6000, a vulnerability that allows a privileged Vault operator to achieve remote…

9 months ago

Critical NestJS Vulnerability Allows Remote Code Execution on Developer Machines

A critical Remote Code Execution (RCE) vulnerability has been discovered in the NestJS development tools package, allowing malicious websites to…

9 months ago

Unit 42 Introduces New Framework for Categorizing Threat Actors by Their Actions

Palo Alto Networks' Unit 42 threat intelligence team has unveiled a comprehensive new methodology for attributing cyber attacks to specific…

9 months ago

Silent Intrusion – Threat Actors Utilize Malicious RMM Tools for Stealthy Initial Access to Organizations

Cybersecurity researchers at WithSecure have identified a sophisticated campaign targeting organizations across Europe, with threat actors leveraging legitimate Remote Monitoring…

9 months ago

Singapore’s Strategic Approach to Countering State-Sponsored Cyber Threats – A Deep Dive into APT Responses

Singapore's recent disclosure of an ongoing cyberattack by the sophisticated threat group UNC3886 reveals the city-state's nuanced approach to managing…

9 months ago