Jun 19, 2025Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that cou...
Category: Attack
A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in p...
A new multi-stage malware campaign is targeting Minecraft users with a Java-based malware that employs a distribution-as-service (DaaS) offering...
Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to d...
Jun 18, 2025The Hacker NewsDevSecOps / Security Architecture For organizations eyeing the federal market, FedRAMP can feel like a gated fortre...
Jun 18, 2025Ravie LakshmananHacktivism / Cyber Warfare Iran has throttled internet access in the country in a purported attempt to hamper Isra...
Jun 18, 2025Ravie LakshmananLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a securit...
Jun 18, 2025Ravie LakshmananEspionage / National Security A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little...
Jun 18, 2025Ravie LakshmananVulnerability / Data Protection Veeam has rolled out patches to contain a critical security flaw impacting its Bac...
Jun 17, 2025Ravie LakshmananMalware / Cyber Espionage A now-patched security flaw in Google Chrome was exploited as a zero-day by a threat act...
