Skip to content
cyber news Page 4

cyber news

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

May 06, 2025Ravie LakshmananCloud Security / DevOps Microsoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data. “While these ‘plug-and-play’… 

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence

May 06, 2025Ravie LakshmananCybersecurity / Vulnerability A recently disclosed critical security flaw impacting the open-source Langflow platform has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency… 

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi

May 05, 2025Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple’s AirPlay protocol that, if successfully exploited, could enable an attacker to take over susceptible devices supporting… 

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed

May 05, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center to its Known Exploited Vulnerabilities (KEV) catalog, a little over a… 

Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors

May 05, 2025Ravie LakshmananCybersecurity / Hacking News What if attackers aren’t breaking in—they’re already inside, watching, and adapting? This week showed a sharp rise in stealth tactics built for long-term access and silent control. AI… 

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data

The threat actors known as Golden Chickens have been attributed to two new malware families dubbed TerraStealerV2 and TerraLogger, suggesting continued development efforts to fine-tune and diversify their arsenal. “TerraStealerV2 is designed to collect browser…