Sunday, April 26, 2026
HomeUncategorized

Uncategorized

New ‘Daemon Ex Plist’ Exploit Grants Hackers Root Access on macOS

A critical vulnerability in macOS that allows attackers to escalate privileges and gain root access through a vulnerability in the system's service management mechanism. The exploit, dubbed "Daemon Ex Plist," targets Apple's launch daemon configuration files and has been found to affect numerous popular...

CISA Publishes 13 ICS Security Alerts on Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a comprehensive set of Industrial Control Systems (ICS) advisories on July 17, 2025, addressing critical security vulnerabilities across multiple vendor platforms. These advisories represent a significant effort to protect critical infrastructure by providing timely information...

Hackers Exploit Signal App Clone Vulnerability to Steal Passwords

A critical security vulnerability in TeleMessageTM SGNL, an enterprise messaging system designed to mirror Signal's secure communication features, has been actively exploited by cybercriminals since its disclosure in May 2025. The vulnerability, designated CVE-2025-48927, affects government agencies and enterprises using the platform to archive...

New BIND 9 Vulnerabilities Put Organizations at Risk of Cache Poisoning and DoS Attacks

Two critical vulnerabilities in BIND 9, one of the most widely deployed DNS server software solutions globally. Released on July 16, 2025, these security vulnerabilities pose significant risks to organizations running affected versions, potentially exposing them to cache poisoning attacks and denial-of-service incidents...

Microsoft Entra ID Vulnerability Enables Privilege Escalation to Global Administrator

A critical vulnerability in Microsoft's Entra ID (formerly Azure Active Directory) that allows attackers to escalate privileges and impersonate any user with Global Administrator privileges. The privilege escalation technique leverages a fundamental weakness in how Microsoft's first-party applications handle authentication credentials. Attackers who compromise...

Cybercriminals Leveraging DNS Gaps to Conceal and Distribute Malware

A sophisticated technique where threat actors are exploiting DNS infrastructure to hide malware and establish persistent command-and-control communications, turning the internet's foundational addressing system into an unwitting storage and delivery platform for malicious software. The discovery, made through analysis of passively collected DNS records in...