Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

04/07/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating systems that could enable local attackers to escalate their privileges to root on

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

04/07/2025 0 Comments 0 tags

Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom GenAI workflows are creating new, hidden ways for

Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission

04/07/2025 0 Comments 0 tags

Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android device users’ cellular data when they were

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

03/07/2025 0 Comments 0 tags

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new report from HUMAN. The identified apps were designed to load

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

03/07/2025 0 Comments 0 tags

The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance, and transport sectors in the country were impacted by a malicious campaign undertaken

The Hidden Weaknesses in AI SOC Tools that No One Talks About

03/07/2025 0 Comments 0 tags

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

03/07/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users’ digital assets at risk. “These extensions impersonate legitimate

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

03/07/2025 0 Comments 0 tags

Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM SME) that could permit

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

02/07/2025 0 Comments 0 tags

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics.

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

02/07/2025 0 Comments 0 tags

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to assist threat actors in their