67993c621bafd9f5adad3973 Blog 0day Zyxel 690x550

Zyxel Warns of Active Exploitation of Unpatched Vulnerability in CPE Devices

2025-01-30

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability Zyxel Communications has issued a critical security warning for its Customer Premises Equipment (CPE) devices, which are currently being targeted by cyber attackers exploiting the unpatched CVE-2024-40891 vulnerability. This flaw, identified in multiple Zyxel router and gateway models, isContinue Reading

VMWare 690x550

SQL Injection Bug in VMware Avi Load Balancer Puts Enterprise Data at Risk

2025-01-30

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer Broadcom, the parent company of VMware, has issued an urgent security warning regarding a critical vulnerability in the VMware Avi Load Balancer. The flaw, identified as a high-severity SQL injection vulnerability, poses significant risks to organizations using theContinue Reading

UAC 0063 1 690x480

European Embassies Targeted in Widespread Cyber Attack

2025-01-30

UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents In a disturbing new development, the cyber group UAC-0063 has escalated its operations, expanding its attacks to European embassies across multiple countries. The group, which has been linked to previous cyber espionage campaigns, is now leveraging stolen diplomatic documents toContinue Reading

IMG 4498 690x415

The Battle for AI Supremacy: China vs. the United States

2025-01-29

Navigating the AI Landscape: US Strategy vs. Chinese Ambition China and the U.S. are locked in a high-stakes tech rivalry, with artificial intelligence (AI) emerging as a critical battleground. China’s advancements in AI, such as its homegrown DeepSeek algorithms and expansive data capabilities, threaten to overshadow American AI leadership. WhileContinue Reading

IMG 4323 690x415

Ransomware Attack Targets VMware ESXi via SSH Tunneling : A Growing Threat

2025-01-24

The Stealthy Threat: Ransomware Attackers Use SSH Tunneling to Bypass Security In recent months, cybersecurity experts have observed a surge in ransomware attacks exploiting vulnerabilities in VMware ESXi, a widely used server virtualization platform. These attacks are particularly concerning as they bypass traditional security defenses by using SSH tunneling, aContinue Reading

Download

ICICI Bank Data Breach: Bashe Hacking Group Claims Responsibility

2025-01-24

Mumbai – In a shocking revelation, the Bashe hacking group has claimed responsibility for breaching the systems of ICICI Bank, one of India’s leading financial institutions. The alleged cyberattack has raised serious concerns about the security of sensitive customer data and the potential financial implications of the breach. According toContinue Reading

IMG 4232 690x415

Thousands of Users Report ChatGPT Access Issues: Is ChatGPT Down?

2025-01-24

ChatGPT Users Face Frustration as Service Experiences Widespread Issues In recent days, thousands of users across the globe have reported issues accessing ChatGPT, with many unable to connect to the chatbot at all. The widespread problem has left users frustrated and wondering if the service is facing a larger, system-wideContinue Reading

IMG 3826

RBI Unveils Comprehensive Plan to Combat Voice Call and SMS Frauds

2025-01-19

RBI Issues Guidelines to Banks and NBFCs for Preventing Financial Frauds via Voice Calls and SMS The Reserve Bank of India (RBI) has issued comprehensive guidelines to banks and non-banking financial companies (NBFCs) aimed at curbing financial frauds perpetrated through voice calls, SMS, and other communication channels. The move comesContinue Reading

IMG 3825

India and USA Sign MoU in Washington to Strengthen Cybercrime Investigation Collaboration

2025-01-19

Historic MoU Signed in Washington to Boost India-US Cybersecurity Cooperation In a significant step toward combating the rising menace of cybercrime, India and the United States have signed a Memorandum of Understanding (MoU) in Washington to bolster their collaboration in cybercrime investigations. The agreement, signed by top officials from bothContinue Reading