Cybersecurity experts have recently demonstrated how heavy-duty vehicles such as commercial trucks and buses can be remotely compromised, potentially giving attackers control over critical vehicle functions. These findings highlight significant vulnerabilities in the increasingly software-driven and interconnected nature of modern…
Tag: Cyber Security News
Hackers Exploiting TP-Link Vulnerability to Gain Root Access
Researchers have uncovered a critical vulnerability in TP-Link TL-WR845N routers that could allow attackers to gain complete control over affected devices. The flaw, identified as CVE-2024-57040 and assigned a CVSS score of 9.8 (Critical), exposes hardcoded root shell credentials stored…
Cybersecurity Weekly Recap: Key Updates on Attacks, Vulnerabilities, & Data Breaches
Welcome to this week’s Cybersecurity Newsletter, where we provide you with the latest updates and essential insights from the rapidly changing field of cybersecurity. Staying informed is crucial in today’s fast-paced digital environment. Our goal is to provide you with…
RedCurl APT leveraging Active Directory Explorer & 7-Zip To Archive Exfiltrated Data
In a sophisticated cyber espionage campaign discovered in January 2025, the RedCurl APT group (also known as EarthKapre) has been observed targeting law firms and corporate organizations with a focus on corporate espionage. The threat actors employ a multi-stage attack…
100+ Auto Dealers Hacked With A ClickFix Webpage Leads To SectopRAT Malware Installation
A sophisticated supply chain attack has compromised over 100 automotive dealerships across the country, exposing countless visitors to malware infection. The attack leveraged a shared video service specifically used by auto dealerships, injecting malicious code that redirected unsuspecting users to…
Critical Vulnerabilities In Delphi Code Leads To Memory Corruption
Researchers have uncovered serious memory corruption vulnerabilities in Delphi programming language, challenging the widespread belief that Delphi provides inherent memory safety protections. These findings highlight significant security risks that could potentially lead to application crashes, data leaks, or even remote…
Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer
A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The attack leverages exposed instances of Jupyter Notebook, an interactive application widely used by data scientists containing a Python IDE, to deploy…
DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware
Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite built-in safeguards. The AI model, designed with reasoning capabilities, initially refuses to generate malicious code but can be circumvented through…
AWS SNS Abused To Exfiltrate Data & Phishing Attack
Amazon Web Services Simple Notification Service (AWS SNS) has emerged as a new vector for malicious actors to exfiltrate sensitive data and conduct phishing campaigns. This pub/sub messaging service, designed to enable application-to-person and application-to-application communications, is increasingly being exploited…
Top Cybersecurity Tools of 2025 To Managing Remote Device Threats
The rise of remote work has significantly increased the attack surface for cybercriminals, making robust cybersecurity tools more critical than ever. As organizations adapt to a world where employees operate from diverse locations, cyber threats targeting remote devices continue to…