OpenAI has recently suspended the capability of its AI video model, Sora, to generate videos depicting the late civil rights leader, Dr. Martin Luther King […]
Year: 2025
CISA Highlights Critical Adobe AEM Vulnerability Amid Active Exploitation
On October 16, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical security vulnerability affecting Adobe Experience Manager (AEM) to its Known […]
Unveiling the Hidden Costs of Penetration Testing
Penetration testing, commonly known as pen testing, is a critical component in assessing and fortifying an organization’s cybersecurity defenses. By simulating cyberattacks, pen tests identify […]
Cyberattackers Exploit Cisco SNMP Vulnerability to Deploy Linux Rootkits in ‘Zero Disco’ Campaign
In a recent cybersecurity development, researchers have uncovered a sophisticated campaign, dubbed Operation Zero Disco, that exploits a vulnerability in Cisco’s IOS and IOS XE […]
LinkPro Linux Rootkit Exploits eBPF for Stealth and Activates via Magic TCP Packets
A recent investigation into a compromised Amazon Web Services (AWS) infrastructure has unveiled a sophisticated GNU/Linux rootkit named LinkPro. This discovery, made by cybersecurity firm […]
Hackers Exploit Blockchain Smart Contracts to Distribute Malware via Compromised WordPress Sites
In a concerning development, cybersecurity experts have identified a financially motivated threat actor, designated as UNC5142, leveraging blockchain smart contracts to disseminate information-stealing malware. This […]
North Korean Hackers Employ EtherHiding to Conceal Malware in Blockchain Smart Contracts
In a significant escalation of cyber threats, a North Korean state-sponsored hacking group has been identified utilizing a novel technique known as EtherHiding to distribute […]
Enhancing SOC Efficiency: Detecting More Threats Without Alert Overload
In the dynamic realm of cybersecurity, Security Operations Centers (SOCs) are inundated with a deluge of alerts daily. This constant influx, often comprising numerous false […]
YouTube Restores Service After Widespread Global Outage
On October 15, 2025, YouTube, the world’s leading video-sharing platform, experienced a significant global outage that disrupted services for millions of users across various continents, […]
Microsoft Thwarts Vanilla Tempest’s Malicious Campaign by Revoking Fraudulent Certificates
In a decisive move to protect its users, Microsoft has revoked over 200 digital certificates exploited by the cybercriminal group known as Vanilla Tempest. This […]