Apple Exploits Vulnerabilities Windows2 Min Read November 4, 2025 Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious…
Exploits Mobile Security Vulnerabilities Windows2 Min Read October 16, 2025 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to…
Exploits Ransomware Vulnerabilities2 Min Read October 16, 2025 CISA Emergency Alert: Critical Adobe AEM Flaw (CVE-2025-54253, CVSS 10.0) Under Active Exploitation The Cybersecurity and Infrastructure Agency (CISA) has added a critical Adobe Experience Manager (AEM) to its Known Exploited (KEV) Catalog,…
Exploits Vulnerabilities2 Min Read October 15, 2025 Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites A security vulnerability affecting millions of WordPress websites has been uncovered in the widely used Slider Revolution plugin. The flaw,…
Exploits Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Critical RCE Flaws CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9) Found in Veeam Backup & Replication Veeam Software has released patches addressing three newly disclosed , including two critical Remote Code Execution (RCE) in Veeam Backup…
Exploits Network Supply Chain Vulnerabilities2 Min Read October 14, 2025 FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process Fortinet has issued an urgent advisory revealing a critical weakness in its FortiPAM and FortiSwitch Manager products that could allow…
Exploits Network Vulnerabilities1 Min Read October 14, 2025 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October 14, 2025, that could enable local authenticated…
Botnets Exploits ICS/OT Network2 Min Read October 14, 2025 Chinese Hackers Use Trusted ArcGIS App For Year-Long Persistence Security teams have been urged to adopt proactive threat hunting after a new report revealed how Chinese hackers used novel techniques to…
Exploits Phishing Vulnerabilities Windows2 Min Read October 14, 2025 Microsoft Patches Edge IE Mode After Hackers Exploited Chakra Zero-Day for Device Takeover After discovering that hackers were exploiting a zero-day in the Chakra JavaScript engine used by Internet Explorer versions 9, 10, and 11,…
Exploits Malware Ransomware Vulnerabilities3 Min Read October 14, 2025 RMPocalypse Flaw (CVE-2025-0033) Bypasses AMD SEV-SNP to Fully Compromise Encrypted VMs A research team from ETH Zurich has disclosed a critical — CVE-2025-0033, dubbed RMPocalypse — that undermines AMD’s…
Cloud Security Exploits Malware Vulnerabilities3 Min Read October 14, 2025 Stealth C2: Hackers Abuse Discord Webhooks for Covert Data Exfiltration in npm, PyPI, and RubyGems Supply Chain Attacks The Socket Threat Research Team has uncovered a growing trend among malicious package developers: leveraging Discord webhooks as…
Data Breach Exploits Supply Chain Vulnerabilities2 Min Read October 12, 2025 Critical Vulnerability CVE-2025-61884 Found in Oracle E-Business Suite Oracle E-Business Suite (EBS) — a cornerstone ERP platform for countless enterprises across the globe — faces a critical security…
Data Breach Exploits Vulnerabilities1 Min Read October 12, 2025 Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884) Oracle has revealed the existence of yet another remotely exploitable Oracle E-Business Suite vulnerability (CVE-2025-61884). About…
Exploits Malware Network Vulnerabilities3 Min Read October 10, 2025 Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit Website owners using the Service Finder WordPress theme and its bundled Bookings plugin must update their software immediately, as a serious…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Exploits Vulnerabilities2 Min Read October 10, 2025 Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks An active in-the-wild exploitation of a zero-day vulnerability in Gladinet CentreStack and Triofox products. Tracked as CVE-2025-11371, the…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to…
Exploits Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Apple Exploits Vulnerabilities2 Min Read October 8, 2025 Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
DDoS Exploits Vulnerabilities3 Min Read October 8, 2025 Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
Exploits Ransomware Vulnerabilities2 Min Read October 8, 2025 OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames researcher David Leadbeater has disclosed a in OpenSSH, identified as CVE-2025-61984, which highlights how even minor quirks in command-line…
Exploits Malware Network Vulnerabilities3 Min Read October 8, 2025 Actively Exploited: Critical Flaw CVE-2025-5947 (CVSS 9.8) Allows Unauthenticated Admin Takeover in WordPress Plugin researchers at Wordfence have issued an urgent warning about an actively exploited authentication bypass in the Service Finder Bookings plugin…
Exploits ICS/OT Vulnerabilities Web Security2 Min Read October 8, 2025 CISA Adds Zimbra XSS Flaw to KEV After Active Exploitation On October 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-27915—an actively exploited vulnerability…
Exploits Vulnerabilities2 Min Read October 7, 2025 Redishell: The Critical 13-Year-Old Redis Vulnerability Need to be Patched In early October 2025, a devastating remote code execution (RCE) vulnerability in Redis—known as Redishell (CVE-2025-49844)—shook…
Data Breach Exploits Ransomware Vulnerabilities3 Min Read October 7, 2025 Clop raid on Oracle E-Business Suite started months ago, researchers warn Security boffins say the Clop cybercriminal gang has been rummaging through Oracle's E-Business Suite (EBS) for months – and now the…
Exploits Malware Vulnerabilities2 Min Read October 7, 2025 Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844) Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a critical vulnerability…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
Exploits Malware Supply Chain Vulnerabilities3 Min Read October 7, 2025 Researchers Uncover 13-Year-Old Redis Flaw Impacting Nearly 330,000 Instances Researchers have uncovered a 13-year-old critical remote-code-execution flaw in Redis that let attackers escape the product’s Lua…
Exploits Network Vulnerabilities2 Min Read October 7, 2025 Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882) Resecurity and watchTowr researchers have analyzed the leaked scripts used by attackers to exploit CVE-2025-61882 on internet-facing Oracle…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 NCSC: Patch Critical Oracle EBS Bug Now Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the…
Exploits Vulnerabilities2 Min Read October 3, 2025 Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated…
Exploits Network Vulnerabilities2 Min Read October 3, 2025 DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely A critical vulnerability has been discovered in DrayTek’s DrayOS routers, which could allow unauthenticated remote attackers to execute…
DDoS Exploits Phishing Vulnerabilities2 Min Read October 3, 2025 Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform.…
Exploits Vulnerabilities2 Min Read October 3, 2025 GreyNoise Detects Coordinated Surge Exploiting Grafana Path Traversal Flaw (CVE-2021-43798) Recently, GreyNoise observed a sudden and highly coordinated wave of exploitation attempts targeting CVE-2021-43798, a Grafana path traversal…
Android Exploits Linux Vulnerabilities2 Min Read October 3, 2025 Researcher Details Zero-Day Linux/Android Kernel Flaw (CVE-2025-38352) researcher StreyPaws has published an in-depth analysis of CVE-2025-38352, a Time-of-Check to Time-of-Use (TOCTOU) race condition in the…
Exploits Phishing Ransomware Social Engineering4 Min Read October 2, 2025 US Government Shutdown to Slash Federal Cybersecurity Staff The US government shutdown will severely deplete federal cybersecurity capabilities, with the Cybersecurity and Infrastructure Security Agency…
Exploits Ransomware Windows Zero Trust5 Min Read October 2, 2025 Rethinking NHI Security: The Essential Shift to Zero Trust Security and Ephemeral Identities As identity security becomes increasingly critical in cybersecurity, the focus has shifted from safeguarding human identities to…
Data Breach Exploits Ransomware2 Min Read October 2, 2025 Forrester: Agentic AI-Powered Breach Will Happen in 2026 An agentic AI deployment will cause a publicly disclosed data breach next year, leading to employee dismissals, Forrester has predicted.…