Latest Cyber Security News

Researchers Detailed ZAP Scanner’s Capabilities in Identifying Security Flaws

Researchers have conducted a detailed study on the capabilities of ZAP (Zed Attack Proxy), an open-source tool widely used for identifying vulnerabilities in web...

Three Cryptomixer Masterminds Charged Processing Ransomware Payments

The U.S. Department of Justice (DoJ) has indicted three Russian nationals, Roman Vitalyevich Ostapenko, Alexander Evgenievich Oleynik, and Anton Vyachlavovich Tarasov, for their alleged...

Hackers Exploiting YouTube to Deliver Malware Bypassing Antivirus Detections

Cybercriminals are increasingly leveraging YouTube's vast platform to distribute malware, bypassing traditional antivirus detections and exploiting users' trust in the popular video-sharing site. Security researchers...
macOS Sandbox poc exploit

Critical macOS Sandbox Vulnerability (CVE-2024-54498) PoC Exploit Released Online

A proof-of-concept exploit was released for a critical vulnerability impacting macOS systems, identified as CVE-2024-54498. Security researcher @wh1te4ever recently revealed a proof-of-concept (PoC) exploit...
33,542 Ivanti Connect Secure Instances Exposed

33,542 Ivanti Connect Secure Instances Exposed as Exploitation of CVE-2025-0282 Unfolds

A critical security vulnerability, CVE-2025-0282, has been identified and exploited in the wild, affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways....

100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect

Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis revealed that the malware...
IBM watsonx.ai Vulnerability

IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI

IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to cross-site scripting (XSS) attacks. The vulnerability, identified as CVE-2024-49785, affects both...

Recent News

Vulnerability Management Tools

10 Best Vulnerability Management Tools In 2025

Vulnerability Management Tools play a significant role in detecting, analyzing, and patching vulnerabilities in web and network-based applications. The most common words used in...
OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys

OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys

A critical vulnerability, identified as CVE-2024-8474, has been discovered in OpenVPN Connect, a popular VPN client software. This flaw could allow attackers to access...
New NonEuclid RAT Bypassing Antivirus And Encrypts Critical Files

New NonEuclid RAT Bypassing Antivirus And Encrypts Critical Files

The NonEuclid Remote Access Trojan (RAT), a highly sophisticated malware, has been detected, allowing unauthorized remote access via advanced evasion techniques and ransomware encryption...
Malicious EditThisCookie Chrome Extension Steals Login Credentials

Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials

A malicious copycat of the popular "EditThisCookie" extension has been discovered stealing login credentials and engaging in phishing activities. The legitimate EditThisCookie extension, which...
Ivanti VPN 0-Day

Hackers Actively Exploited Ivanti VPN 0-Day Vulnerability (CVE-2025-0282): Technical Analysis

Ivanti publicly disclosed two critical vulnerabilities CVE-2025-0282 and CVE-2025-0283 affecting its Connect Secure (ICS) VPN appliances. The announcement comes amidst alarming reports of active...
IBM Concert Software Vulnerabilities

IBM Concert Software Vulnerabilities Let Attackers steal Sensitive Data

IBM Concert Software has been found vulnerable to multiple security flaws that could allow attackers to trigger denial-of-service (DoS) conditions, expose sensitive information, and...
32 Million Windows 10 Devices At Risk As Microsoft Ends Support

32 Million Windows 10 Devices At Risk As Microsoft Ends Support

Microsoft prepares to end support for its Windows 10 operating system on October 14, 2025. Approximately 32 million devices in Germany, accounting for around...
Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolen

Green Bay Packers Store Hacked: Thousands of Customers’ Credit Card Data Stolen

The Green Bay Packers organization has disclosed a data breach affecting thousands of customers who made purchases on their official online store, packersproshop. The incident,...
Robot Vacuums Hacked

Robot Vacuums Hacked To Spy On Their Owners

Critical vulnerabilities in Ecovacs robot vacuums enable hackers to exploit these devices for surveillance and harassment. The findings, presented at the DEF CON 32 hacking...
New Credit Card Skimmer Attacking WordPress Checkout Pages To Steal Payment Card Data

New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards

A sophisticated credit card skimmer malware had been found hitting WordPress checkout pages, silently injecting malicious JavaScript into database records to obtain sensitive payment...

Vulnerability News

What is

More
    At Cyber Week 2024 , ANY.RUN has rolled out an array of exclusive, time-limited deals tailored to help cybersecurity professionals save big while enhancing their malware analysis capabilities. ANY.RUN interactive sandbox platform, trusted by over 500,000 cybersecurity experts worldwide, is offering special discounts and bonuses for individual security researchers, teams,...

    Top 10 Cyber Security Tools