Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA
Summary: Researchers have identified 46 vulnerabilities in solar inverter products from Sungrow, Growatt, and SMA, potentially allowing attackers to execute remote code or take control of devices, posing severe risks to electrical grids. The vulnerabilities, dubbed SUN:DOWN, could lead to significant disruptions and potential blackouts if exploited.…
Read More

Summary: The video discusses the implications of removing local admin privileges in organizations, particularly in the context of traditional active directory setups. While there are valid reasons to restrict these privileges, the belief that doing so entirely prevents unauthorized code execution is misleading.

Keypoints:

Many organizations seek to remove local admin privileges to enhance security.…
Read More
Investigative Journalists in Serbia Hit by Advanced Spyware Attack
Summary: Two Serbian journalists from the Balkan Investigative Reporting Network (BIRN) were targeted with Pegasus spyware, confirming a disturbing trend of digital surveillance against civil society in Serbia. This incident marks the third use of Pegasus spyware against Serbian activists in recent years, highlighting the ongoing repression and intimidation faced by journalists.…
Read More
CISA Issues Urgent Security Alerts: Critical Vulnerabilities in Schneider Electric, Chrome, and Sitecore
Summary: The Cybersecurity and Infrastructure Security Agency (CISA) has released advisories for critical vulnerabilities that could impact various systems, particularly Schneider Electric’s EcoStruxure Power Monitoring Expert, Google Chrome, and Sitecore CMS/XP. These vulnerabilities pose significant risks, including remote code execution and arbitrary code execution, urging organizations to implement mitigations and keep their systems updated.…
Read More
Firefox Patch Released as Mozilla Addresses Chrome-Like Security Threat
Summary: Mozilla has released an urgent update for Firefox on Windows to fix a critical sandbox escape vulnerability (CVE-2025-2857) that may allow unauthorized system access. This update comes in response to a recent similar exploit found in Google Chrome, highlighting growing concerns over browser security. Users are strongly urged to update their browsers immediately to ensure protection against this and similar vulnerabilities.…
Read More
Pakistan-Linked APT Exploits Youth Laptop Scheme in Cyberattack Targeting India
Summary: A new cybersecurity report by CYFIRMA reveals a sophisticated cyberattack targeting Indian users, allegedly led by a Pakistan-based APT group, APT36. The attackers created a fraudulent website mimicking the Indian Post Office to distribute malware to Windows and Android devices. The report details the tactics used by the group, including spear-phishing and the distribution of malicious applications, to compromise targets and exfiltrate sensitive data.…
Read More
APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware
Summary: An APT group linked to Pakistan, referred to as APT36 or Transparent Tribe, has launched a fake website mimicking India’s postal system to infect users on both Windows and Android platforms. The site delivers malware through a deceptive PDF for Windows users and a malicious app for Android users, both of which are designed to harvest sensitive information.…
Read More
Russia arrests three for allegedly creating Mamont malware, tied to over 300 cybercrimes
Summary: Russian authorities have arrested three individuals linked to the development of Mamont malware, a banking trojan targeting Android devices. The malware allows criminals to transfer funds and collect sensitive information from infected devices while spreading through deceptive channels like Telegram. Authorities continue to crack down on cybercrime amid growing concerns about SMS-based fraud.…
Read More
Top 3 MS Office Exploits Hackers Use in 2025 – Stay Alert!
Summary: Hackers continue to exploit Microsoft Office documents, using phishing attacks, vulnerabilities, and creative tactics to gain access to systems. This article highlights three primary exploits: phishing with Office files, the CVE-2017-11882 Equation Editor exploit, and the Follina vulnerability. Organizations must take proactive steps to secure their environments against these persistent threats.…
Read More
More Solar System Vulnerabilities Expose Power Grids to Hacking 
Summary: Researchers at Forescout have identified over 90 vulnerabilities within solar power products from leading vendors like Sungrow, Growatt, and SMA, highlighting serious risks to electrical grids. Newly discovered vulnerabilities could allow attackers to hijack inverters and execute arbitrary code, potentially disrupting power supply and compromising user data.…
Read More
T-Mobile Coughed Up  Million in SIM Swap Lawsuit
Summary: Greenberg Glusker secured a million arbitration award against T-Mobile following a SIM swap attack that led to significant cryptocurrency theft. The attack exploited T-Mobile’s security failures, allowing an attacker to gain control of customer accounts. This case highlights the ongoing vulnerabilities in telecommunications security and the urgent need for better protections against SIM swapping.…
Read More
SnapCenter Security Flaw Rated Critical—NetApp Urges Immediate Patch
Summary: A critical security vulnerability (CVE-2025-26512) has been discovered in NetApp’s SnapCenter software, allowing authenticated users to escalate privileges and gain unauthorized administrative access. This flaw affects SnapCenter versions prior to 6.0.1P1 and 6.1P1, with a CVSS score of 9.9. While no public exploitation has been detected, organizations are urged to update to the latest versions to mitigate risks.…
Read More
Multiple CVEs Found in Ingress-NGINX—Patch Now to Prevent Cluster Compromise
Summary: A set of vulnerabilities in Ingress-NGINX Controller for Kubernetes poses significant security risks, including unauthorized remote code execution and potential full cluster takeover for versions prior to 1.12.1 and 1.11.5. The Australian Cyber Security Centre has outlined specific vulnerabilities that could allow attackers to manipulate configurations and access sensitive credentials.…
Read More