
Critical VGAuth Flaw in VMware Tools Grants Full System Access
Security researchers have uncovered critical vulnerabilities in VMware Tools’ Guest Authentication Service (VGAuth) that allow…
Bulletproof Host Aeza Group Moves Infrastructure to New Autonomous System
Threat analysts at Silent Push announced the discovery of a major infrastructure shift by the…
New VoIP Botnet Targets Routers Using Default Passwords
Cybersecurity researchers have uncovered a sophisticated botnet operation exploiting VoIP-enabled routers through default password attacks,…
Hackers Inject Destructive Commands into Amazon’s AI Coding Agent
A significant security breach has exposed critical vulnerabilities in Amazon’s artificial intelligence infrastructure, with hackers…
Multiple Hacker Groups Exploit SharePoint 0-Day Vulnerability in the Wild
Microsoft has confirmed that a pair of zero-day vulnerabilities in on-premises SharePoint Server, collectively dubbed…
New CastleLoader Attack Uses Cloudflare-themed Clickfix Method to Compromise Windows Systems
A newly identified loader malware dubbed CastleLoader has emerged as a significant threat since early…
Malware Campaign Uses YouTube and Discord to Harvest Credentials from Computers
The Acronis Threat Research Unit (TRU) has uncovered a sophisticated malware campaign deploying infostealers like…
Bloomberg’s Comdb2 Vulnerable to DoS Through Malicious Packets
Cisco Talos’ Vulnerability Discovery & Research team has disclosed five critical security vulnerabilities in Bloomberg’s…
How to Earn Money Online for Students Without Investment?
In today’s digital world, earning money online as a student has become easier than ever.…
Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
Arctic Wolf Labs has uncovered a sophisticated cyber-espionage operation attributed to the Dropping Elephant advanced…