Cyber News

CISA Alerts on Active Exploitation of iOS 0-Click Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-click vulnerability in Apple's iOS to its Known Exploited…

11 months ago

Apache Tomcat Vulnerabilities Allow Attackers to Bypass Authentication and Launch DoS Attacks

Apache Tomcat, the widely used open-source Java servlet container, disclosed four security vulnerabilities on June 16, 2025, including two high-severity…

11 months ago

Hackers Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet

A critical vulnerability in Langflow to deliver the Flodrix botnet malware. The vulnerability, tracked as CVE-2025-3248 with a CVSS score…

11 months ago

Hackers Exploiting Zyxel RCE Vulnerability Through UDP Port

A critical remote code execution vulnerability affecting Zyxel Internet Key Exchange (IKE) packet decoders. GreyNoise Intelligence has observed a concentrated…

11 months ago

Washington Post Journalists’ Email Accounts Hacked in ‘Targeted’ Cyberattack

The Washington Post has confirmed that cybercriminals successfully infiltrated email accounts belonging to select journalists in what security experts are…

11 months ago

Zoomcar Data Breach: 8.4 Million Users’ Sensitive Information Exposed

Car-sharing platform Zoomcar Holdings, Inc. has disclosed a significant cybersecurity breach that compromised personal information of approximately 8.4 million users.…

11 months ago

Authorities Take Down Darknet Market Archetyp in Joint Operation ‘Deep Sentinel

In a coordinated international law enforcement operation, authorities have successfully dismantled one of the world's largest darknet marketplaces, "Archetyp Market,"…

11 months ago

Microsoft Purview DLP to Limit Microsoft 365 Copilot’s Access to Sensitive Emails

Microsoft is expanding its data protection capabilities by integrating Data Loss Prevention (DLP) controls with Microsoft 365 Copilot, specifically targeting…

11 months ago

Over 20 Malicious Apps on Google Play Targeting Users to Steal Login Information

A sophisticated phishing campaign targeting cryptocurrency users through more than 20 malicious Android applications distributed via the Google Play Store.…

11 months ago

Novel Method for Embedding Digital Images into Text Data via DNS TXT Records

A novel method for storing digital images within Domain Name System (DNS) records has been developed, demonstrating an innovative approach…

11 months ago