Critical security flaws have been uncovered in Ivanti Endpoint Manager Mobile (EPMM), a widely used mobile device management (MDM) solution, exposing organizations to the risk of unauthenticated remote code execution (RCE). The vulnerabilities, tracked as CVE-2025-4427 and CVE-2025-4428, have been…
Tag: Cyber Security News
Cybersecurity for Mergers and Acquisitions – A CISO’s Guide
Mergers and acquisitions (M&A) have become a high-stakes battleground for cybersecurity risks, with 2024 witnessing a surge in regulatory scrutiny, sophisticated cyberattacks, and costly post-deal breaches. As global M&A activity rebounds to pre-pandemic levels, CISOs face unprecedented challenges in safeguarding…
Mitigating macOS Zero-Day Risks – Tools and Techniques
Apple’s macOS has experienced a concerning surge in zero-day vulnerabilities over the past six months, highlighting the need for robust security practices. Recent sophisticated attacks targeting businesses and individuals demonstrate that Apple’s relatively secure ecosystem remains vulnerable to determined threat…
Commit Stomping – An Offensive Technique Let Hackers Manipulate Timestamps in Git to Alter File Metadata
A lesser-known feature of Git, Dubbed “Commit Stomping,” this technique allows users to manipulate commit timestamps, potentially disguising malicious or unauthorized changes in a repository’s history. While not a bug or vulnerability, Commit Stomping exploits Git’s flexibility to rewrite the…
Jenkins Security Update Released With the Fixes for the Vulnerabilities that Exploit CI/CD Pipelines
The Jenkins project has issued a critical security advisory detailing vulnerabilities in five widely used plugins: Cadence vManager, DingTalk, Health Advisor by CloudBees, OpenID Connect Provider, and WSO2 Oauth. These flaws, ranging from medium to critical severity, could allow attackers…
Securing Linux Containers – A Guide for Cloud-Native Environments
As container adoption rapidly accelerates across enterprises in 2025, security professionals are under increasing pressure to focus on securing Linux containers and protecting these ephemeral environments. Container security requires a multi-layered approach that addresses vulnerabilities throughout the container lifecycle –…
SonicWall SMA1000 Vulnerability Let Attackers to Exploit Encoded URLs To Gain Internal Systems Access Remotely
SonicWall has issued a high-priority security advisory (SNWLID-2025-0010) revealing a critical Server-Side Request Forgery (SSRF) vulnerability in its SMA1000 Appliance Work Place interface. Tracked as CVE-2025-40595, the vulnerability carries a CVSS v3 score of 7.2, indicating a high-severity risk. Discovered…
Windows Defender Best Practices – Optimizing Endpoint Protection
As cyberthreats grow in sophistication, organizations must prioritize robust endpoint protection strategies. Microsoft Defender for Endpoint has emerged as a critical tool in this landscape, offering AI-driven threat detection, automated response, and integration with broader security ecosystems like Microsoft Defender…
Researchers Emulated VanHelsing Ransomware Advanced Tactics & Tools Used
Cybersecurity experts have successfully emulated the behaviors of VanHelsing, a sophisticated ransomware-as-a-service (RaaS) operation that emerged in March 2025 and has rapidly gained notoriety in cybercriminal circles. The ransomware employs a double extortion model, encrypting victims’ files with the Curve25519…
Proofpoint To Acquire Microsoft 365 Security Provider Hornetsecurity For $1 Billion
Proofpoint, Inc., a global leader in cybersecurity and compliance, has announced a definitive agreement to acquire Hornetsecurity Group, a prominent pan-European provider of AI-powered Microsoft 365 (M365) security, compliance, and data protection services. This strategic acquisition marks a significant step…
Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked – Pwn2Own Day 1
The first day of Pwn2Own Berlin 2025 wrapped up with a bang, as hackers showcased 11 exploit attempts, including AI-targeted attacks, and walked away with $260,000 in prizes. The Pwn2Own competition, known for pushing the boundaries of cybersecurity, saw successful…
Google to Release Android 16 with Advanced Device-level Security Setting Protection for 3 Billion Devices
Google has announced a significant enhancement to its Advanced Protection Program with the release of Android 16, introducing a robust device-level security setting aimed at safeguarding users against sophisticated cyber threats. Tailored for at-risk individuals such as journalists, elected officials,…
CISA Warns of Google Chromium 0-Day Vulnerability Actively Exploited in the Wild – Patch Now!
The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-4664 to its Known Exploited Vulnerabilities Catalog as the vulnerability is actively exploited in the wild in attacks. This high-severity issue in Google Chromium involves insufficient policy enforcement in the Loader component,…
Hackers Abuse Google Services to Send Malicious Law Enforcement Requests
A sophisticated phishing campaign has emerged targeting Google users with fraudulent law enforcement data requests, exploiting legitimate Google services to bypass security systems and create highly convincing scams. The attack utilizes official Google infrastructure, including the company’s OAuth system and…
New .NET Multi-stage Loader Attacking Windows Systems to Deploy Malicious Payloads
A sophisticated .NET multi-stage malware loader has been actively targeting Windows systems since early 2022, serving as a distribution channel for dangerous payloads including information stealers and remote access trojans. This loader employs a complex three-stage deployment mechanism that helps…
Coinbase Hacked – Massive Data Breach Costs Them $400 Million
Coinbase Global, Inc., one of the world’s largest crypto exchanges, disclosed a major cybersecurity incident in a Form 8-K filing with the U.S. Securities and Exchange Commission (SEC) on May 14, 2025. The breach, orchestrated by an unknown threat actor,…
U.S. officials Investigating Rogue Communication Devices in Solar Power Inverters
U.S. energy officials have launched an investigation after discovering unauthorized communication equipment embedded within Chinese-manufactured solar power inverters connected to critical infrastructure grids across the country. These inverters, which are essential components that convert direct current from solar panels into…
Steel Manufacturer Nucor Shuts Down Production Following Cyber Attacks
Nucor Corporation, the largest steel manufacturer in North America, has temporarily shut down production at several of its facilities after a significant cybersecurity incident involving unauthorized access to its information technology systems. The breach, which was detected earlier this week,…
Threat Actors Weaponizing Open Source Packages to Deliver Malware in Supply Chain Attack
In the first half of 2025, cybersecurity experts have observed a significant rise in threat actors targeting the software supply chain through weaponized open source packages. These attacks leverage the implicit trust developers place in third-party dependencies, transforming seemingly benign…
Windows Defender Application Control Bypassed Using Operationalizing Browser Exploits
Researchers have uncovered a sophisticated technique to bypass Windows Defender Application Control (WDAC), a critical Windows security feature designed to prevent unauthorized code execution. The bypass leverages vulnerabilities in trusted Electron applications, effectively circumventing one of Microsoft’s most robust security…