Cyber News

Cyber Attackers Manipulate Search Engines to Distribute Trojan-Infected Versions of PuTTY and WinSCP to IT Experts

Arctic Wolf has identified a sophisticated cybersecurity threat targeting IT professionals through search engine optimization (SEO) poisoning and malvertising campaigns…

10 months ago

Brave Browser Launches Official Android Version on F-Droid

Brave Software has announced a significant development for privacy-conscious Android users by making its browser available through a dedicated F-Droid…

10 months ago

CISA Warns: ValveLink Vulnerabilities Allow Unauthorized Access to Sensitive Data

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security advisory warning about multiple severe vulnerabilities in Emerson…

10 months ago

Call of Duty Exploit – RCE Vulnerability Allows Gamers to Hack Each Other’s PCs

Activision has taken the PC version of Call of Duty: WWII offline following reports of a critical security vulnerability that…

10 months ago

Q2 Sees Surge in Android Malware – Banking Trojans and Spyware on the Rise

The latest detection statistics from Dr.Web Security Space for mobile devices reveal troubling trends in Android malware for the second…

10 months ago

GitLab Vulnerabilities Allow Remote Code Execution via Malicious Content Injection

GitLab has released critical security patches addressing multiple vulnerabilities, including a high-severity cross-site scripting (XSS) vulnerability that could allow attackers…

10 months ago

NordDragonScan Strikes – Windows Users Under Attack

FortiGuard Labs has exposed a sophisticated cyber campaign utilizing weaponized HTA scripts to deploy the NordDragonScan infostealer, targeting Windows users…

10 months ago

Critical Ruckus Wireless Vulnerabilities Exposes Enterprise Wireless Networks

Multiple critical security vulnerabilities have been identified in Ruckus Wireless management products, putting enterprise wireless networks at severe risk of…

10 months ago

Opossum Attack Breaks TLS Security With Malicious Message Injection

A new cross-protocol attack called Opossum that can break the integrity of secure TLS channels by causing desynchronization between clients…

10 months ago

Researchers Bypass ChatGPT Safeguards to Extract Windows Product Keys

A vulnerability in AI language models, including GPT-4o and GPT-4o-mini, by using a sophisticated social engineering technique that bypasses built-in…

10 months ago