CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure…
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Feb 04, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have called attention…
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
Feb 04, 2025Ravie LakshmananVulnerability / Cyber Espionage A recently patched security vulnerability…
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
Feb 03, 2025Ravie LakshmananOpen Source / Software Security The maintainers of the…
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023
Feb 03, 2025Ravie LakshmananVulnerability / Network Security As many as 768 vulnerabilities…
Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns
Italy's data protection watchdog has blocked Chinese artificial intelligence (AI) firm DeepSeek's…
Top 5 AI-Powered Social Engineering Attacks
Social engineering has long been an effective tactic because of how it…
Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists
Feb 01, 2025Ravie LakshmananPrivacy / Surveillance Meta-owned WhatsApp on Friday said it…
BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key
Feb 01, 2025Ravie LakshmananVulnerability / Zero-Day BeyondTrust has revealed it completed an…


