cyber news

Weaponizing Legitimate System Behaviors to Exfiltrate Secrets in Shared Linux Environments

Shared Linux hosting environments are designed to maximize transparency and facilitate system administration, but these very features can be weaponized…

8 months ago

SSHamble: New Open-Source Tool Exposes SSH Protocol Vulnerabilities

SSHamble, a powerful open-source tool designed to identify and exploit vulnerabilities in SSH implementations, during his presentation at DEFCON 33…

8 months ago

Xerox FreeFlow Vulnerabilities Enable SSRF and Remote Code Execution Attacks

Xerox Corporation has released a critical security bulletin addressing two high-severity vulnerabilities in its FreeFlow Core v8.0.4 software that could…

8 months ago

7-Zip Vulnerability Enables Arbitrary File Write and Remote Code Execution

A critical security vulnerability has been discovered in 7-Zip, the popular file compression utility, that allows attackers to perform arbitrary…

8 months ago

Critical Security Vulnerabilities Discovered in WWBN AVideo, MedDream, and Eclipse ThreadX Module

Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of twelve security vulnerabilities affecting three distinct software products.…

8 months ago

Windows UAC Bypassed via Character Editor for Privilege Escalation

A new technique that allows attackers to bypass Windows User Account Control (UAC) protections using the system's built-in Private Character…

8 months ago

CISA Issues 10 ICS Advisories on Critical Vulnerabilities and Exploitation Risks

The Cybersecurity and Infrastructure Security Agency (CISA) on August 7, 2025, published ten new Industrial Control Systems (ICS) advisories to…

8 months ago

US Confirms Takedown of BlackSuit Ransomware Behind Attacks on 450+ Organizations

The U.S. Homeland Security Investigations (HSI),coordination with international law enforcement agencies, has successfully dismantled the critical infrastructure of BlackSuit ransomware,…

8 months ago

AWS Credential Exfiltration via Amazon ECS Internal Protocol Abuse

A technique dubbed "ECScape" that allows malicious containers running on Amazon Elastic Container Service (ECS) to steal AWS credentials from…

8 months ago

Flipper Zero Dark Web Firmware Defeats Rolling Code Security in Modern Cars

A revolutionary exploit discovered through custom firmware for the Flipper Zero device has exposed a critical vulnerability in the rolling…

8 months ago