NsaMag
Menu
  • Home
  • IT Securty News
  • IT Securty Articles
  • Security Magazines
  • About
  • Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

    What’s new: Chinese cyber espionage groups, including Murky Panda, Genesis Panda, and Glacial Panda, have...
  • CISA Issues Draft Software Bill of Materials Guide for Public Comment

    What’s new: CISA has released a draft guide for the Minimum Elements for a Software...
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

    What’s new: A new Linux malware delivery method has been identified, utilizing phishing emails that...
  • GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

    What’s new: Cybersecurity researchers have identified multiple campaigns exploiting known vulnerabilities, particularly CVE-2024-36401, a critical...
  • Fake Mac fixes trick users into installing new Shamos infostealer

    What’s new: A new infostealer malware named 'Shamos' is targeting Mac devices through ClickFix attacks,...

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

August 14, 2025 nsamag Off IT Securty Articles,

What’s new: CISA has added two vulnerabilities affecting N-able N-central to its Known Exploited Vulnerabilities...

OpenAI relaxes GPT-5 rate limit, promises to improve the personality

August 13, 2025 nsamag Off IT Securty Articles,

What’s new: OpenAI has relaxed the rate limits for GPT-5, allowing GPT Plus subscribers to...

Spike in Fortinet VPN brute-force attacks raises zero-day concerns

August 13, 2025 nsamag Off IT Securty Articles,

What’s new: A significant increase in brute-force attacks targeting Fortinet SSL VPNs was observed on...

Microsoft removes PowerShell 2.0 from Windows 11, Windows Server

August 13, 2025 nsamag Off IT Securty Articles,

What’s new: Microsoft will permanently remove PowerShell 2.0 from Windows 11 version 24H2 starting in...

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics

August 13, 2025 nsamag Off IT Securty Articles,

What’s new: A new ransomware family named Charon has been discovered targeting the public sector...

Microsoft Patch Tuesday, August 2025 Edition

August 12, 2025 nsamag Off IT Securty Articles,

What’s new: Microsoft released updates addressing over 100 security vulnerabilities in its software, including 13...

Docker Hub still hosts dozens of Linux images with the XZ backdoor

August 12, 2025 nsamag Off IT Securty Articles,

What’s new: The XZ-Utils backdoor, tracked under CVE-2024-3094, is still present in at least 35...

Manpower discloses data breach affecting nearly 145,000 people

August 12, 2025 nsamag Off IT Securty Articles,

What’s new: Manpower has disclosed a data breach affecting nearly 145,000 individuals after attackers gained...

Netherlands: Citrix Netscaler flaw CVE-2025-6543 exploited to breach orgs

August 12, 2025 nsamag Off IT Securty Articles,

What’s new: The Netherlands' National Cyber Security Centre (NCSC) has reported that a critical vulnerability...

North Korean Kimsuky hackers exposed in alleged data breach

August 11, 2025 nsamag Off IT Securty Articles,

What’s new: North Korean state-sponsored hackers known as Kimsuky have reportedly experienced a data breach,...

Posts pagination

Previous 1 … 4 5 6 … 9 Next

Popular Programs

Nsauditor Network Security Auditor
Network Security Auditing for possible vulnerabilities.Over 45 net tools.
Nsauditor is an advanced network security scanner for auditing and monitoring network computers for possible vulnerabilities. The software checks network computers using all potential methods that a hacker might use to attack it.
Buy Now | Download | More

Product Key Explorer
Product Key Explorer recovers product keys from local or network computers
Product Key Explorer is a powerful product key find and product key recovery software for over +10000 software. It recovers product keys from local or network computers.
Buy Now | Download | More

LPR Lost Password Recovery
Recover website, email, social media passwords from most popular web browsers
LPR Lost Password Recovery reveals website, email, social media passwords from Google Chrome, Microsoft Edge and Opera browsers, allows to backup to HTML, CSV, TXT file or copy to clipboard. All features are provided with a user friendly interface.
Buy Now | Download | More

Categories

  • Computer Security
  • Internet Security
  • IT Securty Articles
  • IT Securty News
  • Network Securty

Recent Posts

  • Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
  • CISA Issues Draft Software Bill of Materials Guide for Public Comment
  • Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
  • GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
  • Fake Mac fixes trick users into installing new Shamos infostealer

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 89 other subscribers

Copyright © 2025 | TechMag designed by Themes4WP