In the first quarter of 2025, cybersecurity experts observed a significant escalation in the exploitation of Common Vulnerabilities and Exposures (CVEs), with 159 distinct vulnerabilities […]
Month: April 2025
TikTok Denies Allegations of Data Breach Exposing Over 900,000 User Credentials
In April 2025, a hacking group known as R00TK1T claimed responsibility for a significant data breach affecting TikTok, alleging that they had exposed the credentials […]
SessionShark: The Emerging Threat to Microsoft Office 365’s Multi-Factor Authentication
In the ever-evolving landscape of cybersecurity threats, a new phishing toolkit named SessionShark has surfaced, posing a significant risk to Microsoft Office 365 users. This […]
Cybercriminals Exploit Vulnerable MS-SQL Servers to Deploy Remote Access Tools
In a recent wave of cyberattacks, threat actors have been targeting inadequately secured Microsoft SQL (MS-SQL) servers to install remote access software and privilege escalation […]
Google Chrome Faces Persistent Use-After-Free Vulnerabilities Exploited in the Wild
Google Chrome has recently encountered a series of critical security incidents involving Use-After-Free (UAF) vulnerabilities, several of which have been actively exploited in the wild. […]
North Korean Operatives Exploit Generative AI to Secure Remote Tech Jobs Globally
In a sophisticated blend of social engineering and advanced technology, North Korean operatives are leveraging generative artificial intelligence (GenAI) tools to infiltrate companies worldwide by […]
Emergence of DslogdRAT Malware via Ivanti Connect Secure Zero-Day Exploitation
In December 2024, cybersecurity researchers identified a new malware strain named DslogdRAT, which was deployed following the exploitation of a critical zero-day vulnerability in Ivanti […]
Critical Vulnerabilities in Rack::Static Expose Ruby Servers to Data Breaches
Cybersecurity researchers have recently identified three significant security vulnerabilities within the Rack Ruby web server interface. These flaws, if exploited, could allow attackers to access […]
The Hidden Threat: Non-Human Identities as Cybersecurity’s Most Dangerous Blind Spot
In the realm of cybersecurity, the term identity traditionally conjures images of usernames, passwords, and multi-factor authentication (MFA) prompts. However, an escalating and often overlooked […]
Critical SAP NetWeaver Vulnerability Exploited to Deploy Web Shells and Brute Ratel Framework
A significant security vulnerability has been identified in SAP NetWeaver, a widely used enterprise resource planning (ERP) platform. This flaw is being actively exploited by […]