#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

20 C
Dubai
Thursday, January 22, 2026
HomeTopics 5

Topics 5

spot_imgspot_imgspot_imgspot_img

Exploiting the Kernel: How Play Ransomware Leveraged a Windows Zero-Day for Privilege Escalation

In early April 2025, cybersecurity researchers uncovered a sophisticated attack by the Play ransomware group, also known as Balloonfly. This operation exploited a previously...

Android Security Bulletin – May 2025: Critical Zero-Day Vulnerability CVE-2025-27363 Actively Exploited

On May 5, 2025, Google released its monthly Android Security Bulletin, addressing 47 vulnerabilities across various components of the Android operating system. Among these,...

Critical Privilege Escalation Vulnerability in OttoKit (Formerly SureTriggers) Under Active Exploitation

On May 2, 2025, the Wordfence Threat Intelligence team added a new critical vulnerability to the Wordfence Intelligence vulnerability database in the OttoKit: All-in-One...

CISA Flags Critical Langflow Vulnerability: CVE-2025-3248 Added to Known Exploited Vulnerabilities Catalog (Daily CVE Reports)

On April 7, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added a new critical vulnerability, CVE-2025-3248, to its Known Exploited Vulnerabilities (KEV) Catalog....

Irish Regulator Slaps TikTok with €530 Million Fine Over Data Transfers to China

A Landmark GDPR Enforcement That Raises Alarms for Global Tech Giants. On May 2, 2025, the Irish Data Protection Commission (DPC) issued a record-breaking...

Securing AI Conversations: WhatsApp’s Private Processing and the Future of Encrypted Messaging (Deploying key transparency at WhatsApp – Engineering at Meta)

As artificial intelligence (AI) becomes increasingly integrated into our daily communication tools, ensuring the privacy and security of user data has never been more...

Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis

In the ever-evolving landscape of cybersecurity, zero-day vulnerabilities remain a formidable challenge. These are security flaws unknown to the software vendor, exploited by attackers...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img