
Elvis Emeka Ikeji
Linux UDisks Flaw (CVE-2025-8067) Lets Local Users Access Sensitive Data
A newly reported vulnerability in the Linux UDisks daemon, tracked as CVE-2025-8067, allows local users without privileges to acce...
Warning: Severe Vulnerabilities in Hikvision Software
Cybersecurity researchers are warning about three vulnerabilities found in Hikvision HikCentral, a centralized management software used for securit...
Tire Giant Bridgestone's Factories Hit by Cyberattack
Tire manufacturer Bridgestone Americas has confirmed it is responding to a cyberattack that disrupted operations at some of its manufacturing plant...
Checkmate: Chess.com Confirms Data Breach via Third-Party App
Chess.com has confirmed a data breach after attackers gained unauthorized access to a third-party file transfer tool used by the platform. The brea...
Facebook Among Social Media Platforms Nepal Plans to Block
Nepal announced on Thursday that it will block several social media platforms that have failed to register with the government. The crackdown aims ...
AI Model Hijack Hits Google and Microsoft
Researchers at Palo Alto Networks have discovered a new AI supply chain attack called Model Namespace Reuse. This method allows attackers to regist...
Hackers Use Grok AI to Spread Malware on X
Cybersecurity researchers have discovered a new technique that allows cybercriminals to bypass X's (formerly Twitter) ad protections and spread mal...
New Phishing Scam Targets PayPal Users
A sophisticated and deceptive scam is targeting PayPal users with the goal of exploiting them financially. According to researchers at Malwarebytes...
CISA Warns of Actively Exploited Flaws in WhatsApp and TP-Link
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a WhatsApp flaw and a TP-Link vulnerability to its list of Known Exploit...