Trending News Guru

Security

Microsoft Affirms Theft of Source Code and Customer Secrets by Russian Hackers.

Microsoft confirmed on Friday that the state-sponsored hacking group known as Midnight Blizzard, linked to the Kremlin, successfully accessed some…

Critical Zero-Day Vulnerabilities Prompt Urgent Apple Updates Due to Active Exploitation.

Apple Responds to Actively Exploited Zero-Days with Urgent Security Updates Apple has released critical security updates, addressing two actively exploited…

“Severe Vulnerabilities in On-Premises JetBrains TeamCity Pose Risk of Server Takeovers”

New security vulnerabilities in JetBrains TeamCity On-Premises software have been disclosed, allowing threat actors to potentially seize control of affected…

“U.S. Critical Infrastructure Under Intense Assault from Phobos Ransomware”.

U.S. cybersecurity and intelligence agencies have issued a warning regarding Phobos ransomware attacks targeting government and critical infrastructure entities. The…

U.S. Court Mandates NSO Group to Provide WhatsApp with Pegasus Spyware Source Code.

US Judge Rules in Favor of Meta, Orders NSO Group to Share Pegasus Source Code Amid Ongoing Lawsuit In a…

“Alert from Five Eyes Agencies: Ongoing Exploitation of Ivanti Gateway Vulnerabilities”

“The Five Eyes Intelligence Alliance Issues Cybersecurity Warning on Active Exploitation of Ivanti Gateway Vulnerabilities The Five Eyes (FVEY) intelligence…

“Benefits Emerge from Strengthened Okta Security Measures After a Series of Challenges”

“Okta’s Intensive 90-Day Security Initiative Post October 2023 Breach Yields Rapid Improvements, CEO Reports. Okta’s CEO, Todd McKinnon, announced significant…

Android and Linux Devices Face Security Risks due to Newly Discovered Wi-Fi Vulnerabilities

Researchers in cybersecurity have unearthed two authentication bypass vulnerabilities in open-source Wi-Fi software utilized by Android, Linux, and ChromeOS devices.…

Apps: Remove these applications from your phone right away!

In early February, ESET, a malware protection company, uncovered a dozen potentially hazardous applications that pose a threat to user…

Raspberry Robin worm, exploiting fresh one-day vulnerabilities, conducts covert attacks

A recently identified iteration of the Raspberry Robin worm is capitalizing on two newly discovered one-day vulnerabilities to initiate discreet…