Network
CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding the active exploitation of a critical remote code ...News|Censorship
UK journalist Sami Hamdi detained in US amid pro-Israel lobby pressure
Far-right activist and Donald Trump ...
Regulation Detention of British Political Commentator British political commentator and journalist Sami Hamdi has been detained by federal authorities in the United ...News|Israel-Palestine conflict
Unexploded Israeli bombs threaten lives as Gaza clears debris, finds bodies
Israel restricts heavy machinery ...
Infrastructure Challenges in Gaza Efforts to rebuild critical infrastructure in Gaza City face significant challenges due to restrictions on the entry of ...Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks
Cybersecurity This week’s Cybersecurity Newsletter covers significant incidents highlighting vulnerabilities in cloud infrastructure, legacy systems, and common browsing tools. AWS Outage On ...9 Best Crypto Coins to Buy Now: Analysts Buying Blazpay Over XRP And Ethereum
Cryptocurrency The cryptocurrency market in late October 2025 is experiencing increased activity as investors seek digital assets with strong growth potential. Blazpay ...706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online – PoC Released
Cybersecurity A high-severity vulnerability has been identified in BIND 9 resolvers, potentially allowing unauthorized cache poisoning and traffic redirection to malicious sites. ...LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
Cybersecurity The LockBit ransomware operation has resumed activities following previous disruptions. Despite earlier law enforcement interventions, the group has launched LockBit 5.0, ...Blazpay or Avalanche: Which Top AI Crypto Coin Will Explode in 2025?
Cryptocurrency Blazpay and Avalanche are two AI-powered cryptocurrency projects that are gaining attention due to their innovative features and potential growth in ...Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject ...
Cybersecurity: IIS Server Vulnerability Exploitation A cyberattack campaign has been identified targeting Microsoft Internet Information Services (IIS) servers. The attack exploits security ...North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
Cybersecurity: North Korean Cyberespionage Targeting UAV Industry A cyberespionage campaign initiated by the Lazarus APT group, supported by the North Korean state, ...



















