Cybersecurity researchers have uncovered a sophisticated campaign involving over 40 malicious Chrome browser extensions that impersonate trusted brands to steal sensitive user data. These extensions, […]
Month: May 2025
Critical Vulnerability in Oracle TNS Protocol Exposes Sensitive System Memory
A significant security flaw has been identified in Oracle’s Transparent Network Substrate (TNS) protocol, potentially allowing unauthenticated attackers to access sensitive system memory contents, including […]
Critical Apache Tomcat Vulnerability (CVE-2025-24813) Exploited for Remote Code Execution
A critical security flaw identified as CVE-2025-24813 has been discovered in Apache Tomcat, a widely used open-source Java servlet container. This vulnerability allows unauthenticated attackers […]
Critical XSS Vulnerability in Bitwarden’s PDF File Handler Exposes Users to Malicious Attacks
A significant cross-site scripting (XSS) vulnerability has been identified in Bitwarden, a widely used password management service. This flaw, cataloged as CVE-2025-5138, affects versions up […]
Malicious npm Packages Compromise Developer Environments by Exfiltrating Sensitive Network Data
A sophisticated malware campaign has infiltrated the npm ecosystem, compromising developer environments through 60 malicious packages designed to silently harvest sensitive network information. This operation, […]
The Emergence of Street-Level QR Code Phishing: A New Frontier in Cybercrime
In a recent development that underscores the evolving nature of cyber threats, security experts have identified a novel form of phishing attack that merges digital […]
Katz Stealer: A Sophisticated Threat Targeting Major Web Browsers
In the ever-evolving landscape of cyber threats, a new and sophisticated malware known as Katz Stealer has emerged, posing significant risks to users of popular […]
Critical Vulnerabilities in Tenable Network Monitor Allow Privilege Escalation
Recent security assessments have uncovered two significant vulnerabilities in Tenable Network Monitor, a tool widely used for passive network traffic analysis. These flaws, identified as […]
Fake DigiYatra Apps Exploit Indian Travelers to Steal Personal and Financial Data
A sophisticated phishing campaign has recently emerged, targeting Indian air travelers by exploiting the trusted DigiYatra brand. This malicious operation involves a deceptive website, digiyatra[.]in, […]
FBI Issues Warning on Silent Ransom Group’s Sophisticated Cyber Attacks
The Federal Bureau of Investigation (FBI) has recently issued a critical alert concerning the Silent Ransom Group (SRG), a cybercriminal organization also known by aliases […]