Cybercriminals have initiated a sophisticated malware campaign targeting Android users by disseminating fraudulent traffic violation messages through WhatsApp. These deceptive messages prompt recipients to download […]
Day: April 12, 2025
Hackers Exploit Domain Controllers via RDP to Deploy Ransomware
In recent years, cybercriminals have increasingly targeted domain controllers (DCs) to deploy ransomware, leveraging Remote Desktop Protocol (RDP) as a primary attack vector. This method […]
Hackers Exploit Patched Fortinet FortiGate Devices to Gain Root Access via Symbolic Link
Fortinet has recently identified a sophisticated post-exploitation technique employed by threat actors to maintain unauthorized access to FortiGate devices, even after the original vulnerabilities were […]
Google Introduces A2A Protocol to Enhance AI Agent Collaboration and Workflow Automation
On April 9, 2025, during the Google Cloud Next conference, Google unveiled the Agent2Agent (A2A) protocol, an open standard designed to facilitate seamless communication and […]
Sapphire Werewolf Deploys Enhanced Amethyst Stealer in Targeted Attacks on Energy Sector
In a recent surge of cyberattacks, the threat actor known as Sapphire Werewolf has intensified its focus on the energy sector, deploying a more sophisticated […]
NVIDIA’s Incomplete Patch for Critical Flaw Exposes AI Model Data to Theft
In September 2024, NVIDIA released a security update to address a critical vulnerability, designated as CVE-2024-0132, in its Container Toolkit. This flaw, with a CVSS […]
RansomHub Ransomware-as-a-Service Faces Internal Turmoil Amid Affiliate Disruptions
RansomHub, a relatively new entrant in the ransomware-as-a-service (RaaS) landscape, is currently grappling with significant internal discord following an abrupt loss of access to its […]
Nationwide UPI Outage Disrupts Digital Transactions Across India
On April 12, 2025, India’s Unified Payments Interface (UPI) experienced a significant outage, marking the fourth disruption in less than three weeks. The outage commenced […]
Zero-Click Remote Code Execution Vulnerability in SuperNote Nomad E-Ink Tablet Allows Full Device Compromise
Security researcher Prizm Labs has uncovered a critical vulnerability in the SuperNote A6 X2 Nomad, a 7.8-inch E-Ink tablet developed by Ratta Software. This flaw, […]
Meta’s Maverick AI Model Falls Short in Chat Benchmark Rankings
Meta’s recent foray into advanced AI with its Llama 4 Maverick model has encountered significant challenges in benchmark evaluations. The unmodified version of Maverick, known […]