Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

30/01/2025 0 Comments 0 tags

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

30/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a critical security flaw in the Lightning AI Studio development platform that, if successfully exploited, could allow for remote code execution. The vulnerability, rated a CVSS

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

30/01/2025 0 Comments 0 tags

An international law enforcement operation has dismantled the domains associated with various online platforms linked to cybercrime such as Cracked, Nulled, Sellix, and StarkRDP. The effort has targeted the following

DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked

30/01/2025 0 Comments 0 tags

Buzzy Chinese artificial intelligence (AI) startup DeepSeek, which has had a meteoric rise in popularity in recent days, left one of its databases exposed on the internet, which could have

SOC Analysts – Reimagining Their Role Using AI

30/01/2025 0 Comments 0 tags

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes IT teams who are doubling as SecOps) must try

New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

30/01/2025 0 Comments 0 tags

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones in order to ensnare them into a network capable of

Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

30/01/2025 0 Comments 0 tags

Three security flaws have been disclosed in the open-source PHP package Voyager that could be exploited by an attacker to achieve one-click remote code execution on affected instances. “When an

Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks

29/01/2025 0 Comments 0 tags

The North Korean threat actor known as the Lazarus Group has been observed leveraging a “web-based administrative platform” to oversee its command-and-control (C2) infrastructure, giving the adversary the ability to

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability

29/01/2025 0 Comments 0 tags

Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. “Attackers can leverage this vulnerability to execute arbitrary

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer

29/01/2025 0 Comments 0 tags

Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The vulnerability, tracked as CVE-2025-22217