SIEM as a Service

Latest Cyber Security News

REF7707 Hackers Attacking Windows & Linux Machines Using FINALDRAFT Malware

A sophisticated hacking campaign has been unveiled recently by Elastic Security Labs, dubbed "REF7707," which has been targeting both Windows and Linux systems using...

New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as "device code phishing" to capture authentication tokens. This attack,...
Salt Typhoon

RedMike Hackers Exploited 1000+ Cisco Devices to Gain Admin Access 

Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as "Salt Typhoon," also referred to as "RedMike."  Between December 2024 and...
AMD Ryzen

AMD Ryzen DLL Hijacking Vulnerability Let Attackers Execute Arbitrary Code

A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master Utility, a software tool designed to optimize the performance...
PostgreSQL Terminal Tool Injection Vulnerability

PostgreSQL Terminal Tool Injection Vulnerability Allows Remote Code Execution

Researchers have uncovered a high-severity SQL injection vulnerability, CVE-2025-1094, affecting PostgreSQL’s interactive terminal tool, psql.  This flaw was identified during research into the exploitation of...

WinZip Vulnerability Let Remote Attackers Execute Arbitrary Code

A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute arbitrary code on affected systems by exploiting malformed 7Z...

Hackers Actively Exploiting New PAN-OS Authentication Bypass Vulnerability

Palo Alto Networks has released a patch for a high-severity authentication bypass vulnerability, identified as CVE-2025-0108, affecting their PAN-OS software. GreyNoise has observed active exploitation...
SIEM as a Service

Recent News

Progress LoadMaster Security

Progress LoadMaster Security Vulnerability let Attackers Execute Arbitrary System Commands 

Progress has disclosed multiple critical security vulnerabilities affecting its LoadMaster product line, including the Multi-Tenant (MT) hypervisor.  These vulnerabilities, identified as CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, CVE-2024-56134,...

BadPilot Attacking Network Devices To Expand Russian Seashell Blizzard’s Attacks

Microsoft Threat Intelligence has exposed a subgroup within the Russian state actor Seashell Blizzard, known as the "BadPilot campaign." This subgroup has been conducting a...
Run PowerShell As Admin

Hackers Trick You To Run PowerShell As Admin & Paste Their Code to Hack...

Microsoft Threat Intelligence has uncovered a new tactic employed by the North Korean state-sponsored hacking group Emerald Sleet, also known as Kimsuky or VELVET...
Ubuntu Printing Vulnerability

Ubuntu Printing Vulnerability Let Attackers Execute Arbitrary Code on Locked Laptops

A recently discovered vulnerability in Ubuntu 22.04's printing subsystem, specifically within the "ippusbxd" package, could have allowed attackers to execute arbitrary code on locked...

FortiOS & FortiProx 0-Day Allows Attackers Hijacks Firewall & Gain Super Admin Access

Fortinet has issued an urgent warning about actively exploiting an already patched authentication bypass zero-day vulnerability (CVE-2025-24472) affecting its FortiOS and FortiProxy products. This critical...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Hackers have increasingly turned to multimedia attachments in recent years, including images and videos, to deliver malware and execute sophisticated scams. This trend has evolved...
Windows 11’s New Compression

Windows 11’s New Compression Formats Pose Security Risks with libarchive

Microsoft introduced a major update to Windows 11 (KB5031455), adding native support for 11 new compression formats, including RAR and 7z.  This update aimed to...

Hackers Exploited Palo Alto’s Firewall Vulnerability to Deploy RA World Ransomware

In a significant cybersecurity breach, attackers exploited a critical vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012) to deploy the RA World ransomware.  The...

Vulnerability News

Shells serve as user interfaces that allow interaction with an operating system's services. They enable users to execute commands, run scripts, and manage files. Bind shells are among the most popular types of shells, particularly in remote administration and network security. This article delves into bind shells, their applications,...

Top 10 Cyber Security Tools