In a significant development within the electric vertical takeoff and landing (eVTOL) sector, Archer Aviation Inc., a leading U.S.-based eVTOL aircraft developer, has successfully acquired […]
Year: 2025
OpenAI Halts Sora’s AI Video Creations of Martin Luther King Jr. Amid Ethical Concerns
OpenAI has recently suspended the capability of its AI video model, Sora, to generate videos depicting the late civil rights leader, Dr. Martin Luther King […]
CISA Highlights Critical Adobe AEM Vulnerability Amid Active Exploitation
On October 16, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical security vulnerability affecting Adobe Experience Manager (AEM) to its Known […]
Unveiling the Hidden Costs of Penetration Testing
Penetration testing, commonly known as pen testing, is a critical component in assessing and fortifying an organization’s cybersecurity defenses. By simulating cyberattacks, pen tests identify […]
Cyberattackers Exploit Cisco SNMP Vulnerability to Deploy Linux Rootkits in ‘Zero Disco’ Campaign
In a recent cybersecurity development, researchers have uncovered a sophisticated campaign, dubbed Operation Zero Disco, that exploits a vulnerability in Cisco’s IOS and IOS XE […]
LinkPro Linux Rootkit Exploits eBPF for Stealth and Activates via Magic TCP Packets
A recent investigation into a compromised Amazon Web Services (AWS) infrastructure has unveiled a sophisticated GNU/Linux rootkit named LinkPro. This discovery, made by cybersecurity firm […]
Hackers Exploit Blockchain Smart Contracts to Distribute Malware via Compromised WordPress Sites
In a concerning development, cybersecurity experts have identified a financially motivated threat actor, designated as UNC5142, leveraging blockchain smart contracts to disseminate information-stealing malware. This […]
North Korean Hackers Employ EtherHiding to Conceal Malware in Blockchain Smart Contracts
In a significant escalation of cyber threats, a North Korean state-sponsored hacking group has been identified utilizing a novel technique known as EtherHiding to distribute […]
Enhancing SOC Efficiency: Detecting More Threats Without Alert Overload
In the dynamic realm of cybersecurity, Security Operations Centers (SOCs) are inundated with a deluge of alerts daily. This constant influx, often comprising numerous false […]
YouTube Restores Service After Widespread Global Outage
On October 15, 2025, YouTube, the world’s leading video-sharing platform, experienced a significant global outage that disrupted services for millions of users across various continents, […]