NsaMag
Menu
  • Home
  • IT Securty News
  • IT Securty Articles
  • Security Magazines
  • About
  • Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

    What’s new: Cisco has reported two zero-day vulnerabilities affecting the VPN web server of Cisco...
  • Kali Linux 2025.3 released with 10 new tools, wifi enhancements

    What’s new: Kali Linux 2025.3 has been released, introducing ten new tools including Caido, Detect...
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

    What’s new: Two medium-severity vulnerabilities have been identified in Supermicro Baseboard Management Controller (BMC) firmware,...
  • Automaker giant Stellantis confirms data breach after Salesforce hack

    What’s new: Stellantis has confirmed a data breach affecting its North American customers, resulting from...
  • FBI warns of cybercriminals using fake FBI crime reporting portals

    What’s new: The FBI has issued a warning about cybercriminals creating fake versions of its...

Panama Ministry of Economy discloses breach claimed by INC ransomware

September 11, 2025 nsamag Off IT Securty Articles,

What’s new: Panama's Ministry of Economy and Finance (MEF) has reported a cyberattack involving possible...

New VMScape attack breaks guest-host isolation on AMD, Intel CPUs

September 11, 2025 nsamag Off IT Securty Articles,

What’s new: A new attack named VMScape has been discovered that breaks guest-host isolation on...

Windows 10 KB5065429 update includes 14 changes and fixes

September 9, 2025 nsamag Off IT Securty Articles,

What’s new: Microsoft has released the KB5065429 cumulative update for Windows 10 22H2 and 21H2,...

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

September 9, 2025 nsamag Off IT Securty Articles,

What’s new: Recent phishing campaigns are leveraging the Axios HTTP client tool and Microsoft's Direct...

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

August 24, 2025 nsamag Off IT Securty Articles,

What’s new: Chinese cyber espionage groups, including Murky Panda, Genesis Panda, and Glacial Panda, have...

CISA Issues Draft Software Bill of Materials Guide for Public Comment

August 23, 2025 nsamag Off IT Securty Articles,

What’s new: CISA has released a draft guide for the Minimum Elements for a Software...

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

August 23, 2025 nsamag Off IT Securty Articles,

What’s new: A new Linux malware delivery method has been identified, utilizing phishing emails that...

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

August 23, 2025 nsamag Off IT Securty Articles,

What’s new: Cybersecurity researchers have identified multiple campaigns exploiting known vulnerabilities, particularly CVE-2024-36401, a critical...

Fake Mac fixes trick users into installing new Shamos infostealer

August 23, 2025 nsamag Off IT Securty Articles,

What’s new: A new infostealer malware named 'Shamos' is targeting Mac devices through ClickFix attacks,...

Murky Panda hackers exploit cloud trust to hack downstream customers

August 22, 2025 nsamag Off IT Securty Articles,

What’s new: The Chinese hacking group Murky Panda (also known as Silk Typhoon) is exploiting...

Posts pagination

Previous 1 2 3 4 … 11 Next

Popular Programs

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers
Product Key Explorer is a powerful product key find and product key recovery software for over +10000 software. It recovers product keys from local or network computers.
Buy Now | Download | More

LPR Lost Password Recovery
Recover website, email, social media passwords from most popular web browsers
LPR Lost Password Recovery reveals website, email, social media passwords from Google Chrome, Microsoft Edge and Opera browsers, allows to backup to HTML, CSV, TXT file or copy to clipboard. All features are provided with a user friendly interface.
Buy Now | Download | More

Categories

  • Computer Security
  • Internet Security
  • IT Securty Articles
  • IT Securty News
  • Network Securty

Recent Posts

  • Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
  • Kali Linux 2025.3 released with 10 new tools, wifi enhancements
  • Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
  • Automaker giant Stellantis confirms data breach after Salesforce hack
  • FBI warns of cybercriminals using fake FBI crime reporting portals

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 89 other subscribers

Copyright © 2025 | TechMag designed by Themes4WP