A two severe security vulnerabilities in Aviatrix Controller, a popular Software-Defined Networking (SDN) utility used to create links between different cloud vendors and regions.
The vulnerabilities, tracked as CVE-2025-2171 and CVE-2025-2172, allowed researchers to bypass authentication and gain root-level command execution on a fully...
In the first quarter of 2025, cybercriminals launched a large-scale malware campaign targeting holiday bookers by creating fake travel websites that closely mimic Booking.com.
According to HP Wolf Security’s latest Threat Insights Report, these fraudulent sites deploy convincing cookie consent banners required under GDPR...
A sophisticated new jailbreak technique that successfully bypasses the safety mechanisms of leading artificial intelligence models with alarming effectiveness.
The so-called "Echo Chamber Attack" achieved success rates exceeding 90% against major AI systems including GPT-4 variants and Google Gemini models, raising serious concerns about...
First observed in March 2025 targeting Windows systems, the BERT ransomware group escalated its operations in May 2025 by launching attacks on Linux machines.
Analysis of two Linux-focused ELF samples reveals an 80% codebase overlap with Sodinokibi (Revil) ransomware, a notorious group linked to...
A critical privilege escalation vulnerability has been discovered in Notepad++ v8.8.1 installer that enables unprivileged users to gain SYSTEM-level privileges through exploiting insecure executable search paths.
The vulnerability, tracked as GHSA-9vx8-v79m-6m24 and published by donho three days ago, affects the popular text editor's installer...
In a notable shift from their conventional targets, North Korean advanced persistent threat (APT) groups have expanded their cyber operations to include Ukrainian government agencies, raising concerns about potential new alliances or opportunistic strategies as global conflicts intensify.
Unusual Attack Targets and Novel Tactics
Traditionally, North...