Cyber News

NVIDIA Megatron LM Vulnerabilities Allows Attackers to Inject Malicious Code

NVIDIA has disclosed critical security vulnerabilities in its Megatron LM software that enable attackers to inject malicious code through compromised…

10 months ago

New FileFix Attack Exploits Windows File Explorer to Run Malicious Commands

A new social engineering attack technique called "FileFix" that exploits Windows File Explorer's address bar functionality to execute malicious commands…

10 months ago

Cyber Attackers Deploy AsyncRAT via Clickfix Technique Through Fake Verification Prompt

In a recent and highly sophisticated cyberattack campaign, threat actors have executed a stealthy and persistent attack leveraging the notorious…

10 months ago

OWASP AI Testing Guide: A New Initiative to Identify Vulnerabilities in AI Applications

The Open Web Application Security Project (OWASP) has announced the development of a comprehensive AI Testing Guide, marking a significant…

10 months ago

Water Curse Hacker Group Unleashes Multistage Malware via 76 Weaponized GitHub Accounts

A highly active cybercriminal group known as "Water Curse" has been found distributing multistage malware through at least 76 weaponized…

10 months ago

Threat Actor Promotes EagleSpy v5 RAT, Claiming Stealthy Android Device Access

A prominent cybercriminal known as "xperttechy" has surfaced on a well-known dark web forum, promoting a new iteration of Android…

10 months ago

Zimbra Classic Web Client Vulnerability Allows Attackers to Execute Arbitrary JavaScript

Zimbra has released critical security patches addressing a severe stored cross-site scripting vulnerability in its Classic Web Client that could…

10 months ago

150K+ Devices Infected by Malicious Loan Apps on iOS & Google Play Store

In a striking revelation, cybersecurity analysts have uncovered a fraudulent scheme involving the widely downloaded “RapiPlata” app, which poses as…

10 months ago

Critical Convoy Vulnerability Allows Remote Code Execution on Servers

A critical directory traversal vulnerability has been discovered in Performave Convoy's LocaleController component, enabling unauthenticated remote attackers to execute arbitrary…

10 months ago

Google Cloud Donates A2A Protocol to Linux Foundation for Secure, Intelligent Communication

Google Cloud announced the transfer of its groundbreaking Agent2Agent (A2A) protocol to the Linux Foundation at Open Source Summit North…

10 months ago