#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

35 C
Dubai
Friday, July 4, 2025
HomeTopics 1

Topics 1

spot_imgspot_imgspot_imgspot_img

MorphoBlue Frontend Vulnerability Exploited for $2.6 Million: A Wake-Up Call for DeFi Security​

On April 11, 2025, the decentralized finance (DeFi) community was shaken by a significant exploit targeting MorphoBlue, a prominent DeFi protocol. An attacker, identified...

100,000+ WordPress Sites at Risk: Administrative User Creation Vulnerability in SureTriggers Plugin Exposes Critical Weakness

A critical vulnerability has been identified in the popular SureTriggers WordPress plugin, affecting over 100,000 active installations. This vulnerability enables unauthenticated attackers to create...

When Bots Get Smarter: How AkiraBot Is Exploiting AI to Evade Defenses and Pollute the Web

In an era where generative AI and automation are transforming cybersecurity and cybercrime AkiraBot stands as a prime example of how malicious actors are...

Triada Returns with a Vengeance: Preinstalled Trojan Targets Cryptocurrency, Messenger Accounts, and Phone Calls

In a startling revelation for the cybersecurity community, Kaspersky researchers have identified a dangerous new variant of the infamous Android trojan Triada. This iteration...

VMSA-2025-0005: Critical Authentication Bypass in VMware Tools for Windows (CVE-2025-22230) Demands Urgent Patching

On March 25, 2025, VMware (a Broadcom subsidiary) issued VMSA-2025-0005, disclosing a high-severity authentication bypass vulnerability (CVE-2025-22230) in VMware Tools for Windows. With a...

FatalRAT Attacks in APAC: A New Cyber Threat Targeting Chinese-Speaking Users

A newly discovered cyber campaign deploying FatalRAT malware is targeting Chinese-speaking individuals and organizations across the Asia-Pacific (APAC) region. The malware, delivered through a...

CrowdStrike and NVIDIA Partner to Revolutionize AI-Driven Cybersecurity

The cybersecurity landscape is evolving rapidly, with adversaries leveraging sophisticated attack techniques powered by artificial intelligence (AI). To stay ahead, CrowdStrike has joined forces...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img