Saturday , May 31 2025

Hot Topic

Why Govt Demands Foreign CCTV Firms to Submit Source Code?

CCTV

Global makers of surveillance gear have clashed with Indian regulators in recent weeks over contentious new security rules that require manufacturers of CCTV cameras to submit hardware, software and source code for assessment in government labs, official documents and company emails show. The security-testing policy has sparked industry warnings of …

Read More »

Zero-Trust Policy bypass to Exploit Vulns & Manipulate NHI Secrets

zero-trust

Recent security research has shown that attackers can weaken zero-trust security frameworks by exploiting a key DNS vulnerability, disrupting automated secret rotation. The research reveals a complex attack chain that starts with disrupting DNS servers and ends with unauthorized access to cloud services, exposing serious flaws in Non-Human Identity (NHI) …

Read More »

Intel PC, laptop and server processors affected for 6 years: Report

Intel

A new class of vulnerabilities in Intel processors, called Branch Predictor Race Conditions (BPRC), enables attackers to extract sensitive data from the cache and RAM of other users on the same hardware. Recent research by computer scientists from the Computer Security Group (COMSEC) at the Department of Information Technology and …

Read More »

CVE-2025-29824
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day

Play Ransomware

Attackers linked to the Play ransomware operation deployed a zero-day privilege escalation exploit during an attempted attack against an organization in the U.S. The attack occurred prior to the disclosure and patching of a Windows elevation of privilege zero-day vulnerability (CVE-2025-29824) in the Common Log File System Driver (clfs.sys) on …

Read More »

South Korea’s largest SK Telecom Hit by Malware: SIM-related info leaked

SK Telecom

South Korea’s largest mobile operator, SK Telecom, is warning that a malware infection allowed threat actors to access sensitive USIM-related information for customers. SK Telecom is the largest mobile network operator in South Korea, holding approximately 48.4% of the mobile phone service market in the country, corresponding to 34 million subscribers. The …

Read More »

16,000+ Fortinet devices compromised with symlink backdoor, Mostly in Asia

symlink

According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called “symlink”. This number has increased from the initial 14,000 and is expected to rise as investigations continue. The attack takes advantage of known vulnerabilities in Fortinet’s FortiGate devices. After gaining access, the threat …

Read More »