Security News

WordPress security plugin WP Ghost vulnerable to remote code execution bug
2025-03-20 14:58

Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute code and hijack servers. [...]

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
2025-03-18 13:31

A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and carry out...

Microsoft replacing Remote Desktop app with Windows App in May
2025-03-11 16:27

Microsoft announced that it will drop support for the Remote Desktop app (available via the Microsoft Store) on May 27 and replace it with its new Windows App. [...]

How remote work strengthens cybersecurity teams
2025-03-11 05:30

The global transition to remote work has reshaped traditional workplace dynamics, introducing challenges and opportunities for cybersecurity teams. For CISOs and security professionals, embracing...

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution
2025-03-06 12:33

Elastic has rolled out security updates to address a critical security flaw impacting the Kibana data visualization dashboard software for Elasticsearch that could result in arbitrary code...

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
2025-02-26 11:04

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to...

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
2025-02-14 18:42

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code...

Kimsuky hackers use new custom RDP Wrapper for remote access
2025-02-06 18:55

The North Korean hacking group known as Kimsuky was observed in recent attacks using a custom-built RDP Wrapper and proxy tools to directly access infected machines. [...]

Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
2025-02-04 14:16

Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to...

The Advantages of Cloud-Based Remote Desktop versus RDP over VPN
2025-01-30 15:11

Remote work is now an essential part of many businesses, requiring organizations to rethink how they provide secure and efficient access to corporate resources. Learn from TruGrid about the...