CVE-2025-32433 In Detail
Cisco is investigating the impact of a recently disclosed Erlang/OTP vulnerability, and it has confirmed that several of its products are affected by the critical remote code execution flaw. It…
OT/ICS Cybersecurity Certifications
OT/ICS cybersecurity certifications to level up your knowledge!Check out these recommended role-based cert combinations! Along with some additional tips and tricks. Just remember that certs don’t take the place of…
Apple fixes two zero-days exploited in targeted iPhone attacks
Apple released emergency security updates to patch two zero-day vulnerabilities that were used in an “extremely sophisticated attack” against specific targets’ iPhones. The two vulnerabilities are in CoreAudio (CVE-2025-31200) and…
How to join IT Army of Ukraine?
The IT Army of Ukraine is a community of IT specialists from all over the world who united after the start of the full-scale invasion of Ukraine by Russia. We…
Rippersec – Hacktivism Group
Threat Groups and Motivations RipperSec is a pro-Palestinian hacktivist group based in Malaysia. They have been active on Telegram since June 2023, amassing over 5,000 followers on their channel before…
Russia Linux Community?
Russia says it might build its own Linux community after removing several kernel maintainers. Russia has called Linux’s recent delisting of several Russian kernel maintainers “an act of discrimination” and…
Cisco Licensing Vulnerabilities Under Active Exploitation
Since March 20, attackers have actively exploited CVE-2024-20439 and CVE-2024-20440 in Cisco’s Smart Licensing Utility to gain unauthorized system access. 🦠 Why It Matters: Cisco’s infrastructure is deeply embedded across…
Amazon is killing a privacy feature
Everything you say to your Echo will be sent to Amazon starting on March 28. Why so much “surveillance”? Since Amazon announced plans for a generative AI version of Alexa,…
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated…