top of page
world-map_edited.jpg

Latest Cybersecurity News

11 May 2025 at 6:00:00 am

Aurora Innovation launches first commercial driverless trucking service on U.S. highways

Laura Harris

Aurora Innovation launched autonomous Class 8 trucks (SAE Level 4) on the Dallas-Houston route, powered by its Aurora Driver system, with no human intervention needed. The trucks feature advanced sensors, redundant systems and AI compliance checks. Aurora log…
9 May 2025 at 5:20:25 pm

Barrick Is Now ‘B’ on the NYSE

GlobeNewswire

NEW YORK, May 09, 2025 (GLOBE NEWSWIRE) — Barrick Mining Corporation (NYSE:B)(TSX:ABX) is now trading under the single-letter ticker symbol ‘B’ on the New York Stock Exchange, reinforcing the Company’s position as a global gold and copper mining leader. In ce…
9 May 2025 at 10:02:29 pm

Scaling startups in the European market | TechCrunch

Tc Video

From cybersecurity and aerospace to generative 3D, startup leaders are scaling ambitious companies from European soil and taking on global markets. In this conversation at the StrictlyVC event in Athens, we talked to three founders about what it takes to go f…
9 May 2025 at 7:13:12 pm

Crypto sleuth ZachXBT says wrong suspect detained in Bored Ape NFT theft

Cointelegraph by Alex O’Donnell

Law enforcement detained the wrong person for a 2022 scam that pilfered more than $1 million worth of Bored Ape non-fungible tokens (NFTs), cybersecurity researcher ZachXBT said. In a May 9 X post, ZachXBT said he identified the wallet behind the scam and lin…
9 May 2025 at 6:50:00 pm

PSU banks refute rumours, say ATMs well stocked and fully functional

The Hills Times

NEW DELHI, May 9: Dismissing rumours, public sector banks including State Bank of India and Punjab National Bank on Friday said their ATMs are fully functional, well-stocked, and that digital services are operating smoothly. The announcements came against the…
9 May 2025 at 6:25:00 pm

NATO chief seeks defence spending at 5% of GDP by 2032: Dutch PM

AFP

THE HAGUE - NATO chief Mark Rutte wants member countries to agree at a summit in June to reach five percent of GDP on defence-related spending by 2032, Dutch premier Dick Schoof said Friday.
9 May 2025 at 7:06:28 pm

Oleg Fleitman: shaping the future of AI and risk management across industries

Mae Cornes

Oleg Fleitman, an accomplished AI and machine learning (ML) practitioner, has been awarded a 2025 Global Recognition Award for his pioneering work at the intersection of technology and ethics. The post Oleg Fleitman: shaping the future of AI and risk manageme…
10 May 2025 at 1:30:15 am

Mint Explainer: How RBI’s new digital lending rules will impact lenders and borrowers

Anshika Kayastha

RBI’s new digital lending directions focus on transparency and borrower rights, including a public registry of lending apps and accountability for lending service providers. Mint explains how the banking regulator aims to build trust and reduce unethical prac…
9 May 2025 at 8:31:38 pm

attack-executor 0.2.6

This library provides standard Python APIs to interact with common penetration testing and cyberattack tools, enabling automated penetration testing, red team operations, and development of cybersecurity-related LLM agents.
9 May 2025 at 8:08:40 pm

CrowdStrike Probed Over $32M IRS Deal

Moz Farooque

DOJ and SEC question execs' knowledge amid potential pre-booking concerns
10 May 2025 at 6:52:03 am

Yle investigation into TikTok data centre raises security concerns

Over the past year, the Finnish project quietly became a joint venture between Chinese investors and a Dubai billionaire.
10 May 2025 at 5:32:16 am

Operation Sindoor: Important Dos and Don'ts Shared by IT Ministry to Prevent Misinformation

Gadgets 360 Staff

The Ministry of Electronics and Information Technology (MeitY) has released online safety guidelines for citizens in the wake of Operation Sindoor. The advisory aims to educate users about the risks of misinformation and emphasises the need for cybersecurity …

CVE-2024-38189

Microsoft Project Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38189

CVE-2024-38106

Microsoft Windows Kernel Privilege Escalation Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106

CVE-2021-33045

Dahua IP Camera Authentication Bypass Vulnerability
https://www.dahuasecurity.com/aboutUs/trustedCenter/details/582

CVE-2023-43208

NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://github.com/nextgenhealthcare/connect/wiki/4.4.1---What%27s-New

CVE-2024-24919

Check Point Quantum Security Gateways Information Disclosure Vulnerability
https://support.checkpoint.com/results/sk/sk182336

CVE-2024-36401

OSGeo GeoServer GeoTools Eval Injection Vulnerability
This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv, https://github.com/geotools/geotools/pull/4797

CVE-2022-22948

VMware vCenter Server Incorrect Default File Permissions Vulnerability
https://www.vmware.com/security/advisories/VMSA-2022-0009.html

CVE-2024-4978

Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability
Please follow the vendor’s instructions as outlined in the public statements at https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack#remediation and https://www.javs.com/downloads

CVE-2024-38178

Microsoft Windows Scripting Engine Memory Corruption Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178

CVE-2024-4040

CrushFTP VFS Sandbox Escape Vulnerability
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update&version=34

CVE-2024-23296

Apple Multiple Products Memory Corruption Vulnerability
https://support.apple.com/en-us/HT214081, https://support.apple.com/en-us/HT214082, https://support.apple.com/en-us/HT214084, https://support.apple.com/en-us/HT214086, https://support.apple.com/en-us/HT214088

CVE-2024-20399

Cisco NX-OS Command Injection Vulnerability
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP

© 2023 by Mallikarjuna Mustugatti. All rights reserved.

bottom of page