Latest News
How Blockchain Games Ensure Transparency and Fairness
The advancement of technology has also impacted sectors like gaming. Blockchain technology has surfaced as an asset that provides an angle on…
10 Best LMS SaaS Platforms for Scalable Online Learning
The education sector is changing quickly as it adopts digital tools for better learning experiences. These days, learning management systems…
Xerox Versalink Printers Vulnerabilities Could Let Hackers Steal Credentials
Xerox Versalink printers are vulnerable to pass-back attacks. Rapid7 discovers LDAP & SMB flaws (CVE-2024-12510 & CVE-2024-12511).…
$10 Infostealers Are Breaching Critical US Security: Military and Even the FBI Hit
A new report reveals how cheap Infostealer malware is exposing US military and defense data, putting national security at risk. Hackers…
Critical OpenSSH Vulnerabilities Expose Users to MITM and DoS Attacks
Two critical OpenSSH vulnerabilities discovered! Qualys TRU finds client and server flaws (CVE-2025-26465 & CVE-2025-26466) enabling MITM…
Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots
The New Snake Keylogger variant targets Windows users via phishing emails, using AutoIt for stealth. Learn how it steals credentials and…
New XCSSET Malware Variant Targeting macOS Notes App and Wallets
Microsoft warns Apple developers about a new XCSSET malware variant targeting macOS, posing security risks through stealthy infections and…
Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
London, United Kingdom, 18th February 2025, CyberNewsWire
Duo Wins $50K Bug Bounty for Supply Chain Flaw in Newly Acquired Firm
Researchers earned a $50,500 Bug Bounty after uncovering a critical supply chain flaw in a newly acquired firm, highlighting security risks in…
Holiverse Makes NASA’s Latest Achievements Accessible to Everyone
People around the world learned about the latest advancements in the American space industry! This was made possible by Holiverse, a…
Hackers Exploit Telegram API to Spread New Golang Backdoor
The new Golang backdoor uses Telegram for command and control. Netskope discovers malware that exploits Telegram’s API for malicious…
10 Key SOC Challenges and How AI Addresses Them
SOC challenges like alert fatigue, skill shortages and slow response impact cybersecurity. AI-driven solutions enhance SOC efficiency,…