Exploits Linux Vulnerabilities Windows2 Min Read October 2, 2025 Chrome 141 Stable Channel Update Patches High-Severity Vulnerabilities (CVE-2025-11205 & CVE-2025-11206) The Chrome team has announced the promotion of Chrome 141 to the Stable Channel for Windows, Mac, and Linux. The release—version…
Data Breach Exploits Vulnerabilities Web Security2 Min Read October 2, 2025 Django Security Alert: High-Severity SQL Injection Flaw (CVE-2025-59681) Fixed in Latest Updates The Django team has issued new releases for the popular Python web framework, addressing two that could lead to SQL injection and directory…
Exploits Network Ransomware Vulnerabilities3 Min Read October 1, 2025 'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover A 9.9 out of 10 severity bug in Red Hat's OpenShift AI service could allow a remote attacker with minimal authentication to steal data,…
Exploits Nation-state Vulnerabilities2 Min Read October 1, 2025 Broadcom Issues Patches for VMware NSX and vCenter Security Flaws A set of substantial security updates for VMware NSX and vCenter has been released by Broadcom, addressing multiple high-severity…
Data Breach Exploits Phishing Ransomware3 Min Read October 1, 2025 Navigating Holiday Threats: Strengthening PC Resilience with Desktops as a Service (DaaS) The holiday season, often seen as a time for joy and celebration, has transformed into a crucial period for organizational cybersecurity. With…
Exploits Linux Vulnerabilities2 Min Read October 1, 2025 Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable…
DDoS Exploits Vulnerabilities3 Min Read October 1, 2025 OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to…
Exploits Vulnerabilities2 Min Read October 1, 2025 CVE-2025-10725 (CVSS 9.9): Red Hat OpenShift AI Privilege Escalation Flaw Could Lead to Full Cluster Compromise The Red Hat team has disclosed a serious in Red Hat OpenShift AI, a platform designed to build, deploy, and manage machine learning (ML)…
DDoS Exploits Vulnerabilities Windows2 Min Read October 1, 2025 NVIDIA Patches Multi Flaws in Delegated License Service, Allows Unauthenticated Access and DoS NVIDIA has issued a bulletin addressing multiple across the NVIDIA App for Windows and the Delegated License Service (DLS) component of the…
Exploits Network Phishing Ransomware2 Min Read September 30, 2025 Smishing Campaigns Exploit Cellular Routers to Target Belgium A newly identified wave of smishing attacks has been traced to exploited Milesight Industrial Cellular Routers. According to research by…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Exploits Linux Ransomware Vulnerabilities2 Min Read September 30, 2025 CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks CISA has issued an urgent advisory regarding a critical vulnerability in the Linux and Unix sudo utility CVE-2025-32463 that is currently…
Exploits Linux Ransomware Vulnerabilities2 Min Read September 30, 2025 CISA warns of critical Linux Sudo flaw exploited in attacks Hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo package that enables the execution of commands with…
Exploits Network Ransomware Vulnerabilities2 Min Read September 30, 2025 Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability Security researchers are observing a significant increase in internet-wide scans targeting the critical PAN-OS GlobalProtect vulnerability…
Exploits Linux Malware Vulnerabilities7 Min Read September 29, 2025 You name it, VMware elevates it (CVE-2025-41244) On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service…
Exploits Phishing Windows2 Min Read September 29, 2025 AI-Generated Code Used in Phishing Campaign Blocked by Microsoft A credential phishing campaign that likely relied on AI-generated code to evade detection has been stopped by Microsoft Threat Intelligence.…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive…
Exploits Phishing Ransomware Vulnerabilities4 Min Read September 29, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Apple Exploits Malware Vulnerabilities2 Min Read September 29, 2025 WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File WhatsApp 0-click remote code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of…
DDoS Exploits Ransomware Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account A critical flaw in SUSE Rancher’s user management module allows privileged users to disrupt administrative access by modifying usernames…
Apple DDoS Exploits3 Min Read September 29, 2025 Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework Google Project Zero has revealed a new technique capable of bypassing Address Space Layout Randomization (ASLR) protections on Apple devices.…
Exploits Vulnerabilities3 Min Read September 29, 2025 Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization A critical security flaw discovered in Formbricks, an open-source experience management platform, demonstrates how missing JWT signature…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 TamperedChef Malware Rises: Deceptive Apps Use Signed Binaries and SEO Poisoning to Hijack Browsers Field Effect’s Threat Intelligence team has uncovered a new wave of the TamperedChef malware campaign, leveraging digitally signed…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 DLL Hijacking Flaw (CVE-2025-56383) Found in Notepad++, Allowing Arbitrary Code Execution, PoC Available A newly disclosed in Notepad++ v8.8.3 has been assigned CVE-2025-56383. The , rated CVSS 6.5, allows attackers to hijack Notepad++’s DLL…
Exploits Vulnerabilities Windows2 Min Read September 27, 2025 CVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized Password Resets via Forged JWT Tokens The Formbricks project, an open-source platform for building in-app and website surveys, has released an urgent patch addressing a critical…
DDoS Exploits Vulnerabilities2 Min Read September 26, 2025 GitLab High-Severity Vulnerabilities Let Attackers Crash Instances GitLab has disclosed multiple high-severity Denial-of-Service (DoS) vulnerabilities that could allow unauthenticated attackers to crash…
Exploits Zero Trust7 Min Read September 26, 2025 Customer Authentication Challenges That Impact Your Organization’s Security Posture Introduction In today’s cybersecurity landscape, CISOs face the challenge of securing data while managing costs effectively. As cyber…
Exploits Malware Network Vulnerabilities2 Min Read September 26, 2025 CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day…
Exploits Phishing Ransomware3 Min Read September 26, 2025 Interpol Cracks Down on Large-Scale African Scamming Networks A transnational operation involving 14 African countries has taken down a large-scale digital scamming network, leading to 260 arrests and the…
Exploits Ransomware Social Engineering2 Min Read September 25, 2025 Critical Vulnerability in Salesforce AgentForce Exposed A critical vulnerability chain in Salesforce's AI-powered AgentForce platform has been discovered by cybersecurity researchers. The flaw,…
Botnets Exploits Malware Vulnerabilities3 Min Read September 25, 2025 Malicious AI Agent Server Reportedly Steals Emails A popular Model Context Protocol (MCP) server used to deploy AI agents has turned malicious in one of its latest updates, according to Koi…
DDoS Exploits IoT Security Ransomware3 Min Read September 25, 2025 Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The…
Exploits Linux Vulnerabilities2 Min Read September 25, 2025 US Federal Agency Breached Via GeoServer Vulnerability IntroductionIn September 2025, CISA confirmed that a major breach had impacted a US federal agency through the exploitation of a critical…
Exploits Ransomware Supply Chain Vulnerabilities5 Min Read September 24, 2025 CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin While investigating the security posture of various machine learning (ML) and artificial intelligence (AI) frameworks, the Trend Micro Zero…
Exploits Vulnerabilities1 Min Read September 24, 2025 SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399) SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular…
Exploits Ransomware Vulnerabilities3 Min Read September 24, 2025 CISA Says Failure to Patch, Untested IRP, Silent EDR Alerts, Led to a Federal Agency Breach CISA this week offered a rare window into a real-world breach at a U.S. federal civilian agency. Delays in patching, unexercised incident…
Exploits Malware Vulnerabilities2 Min Read September 24, 2025 Supermicro server motherboards can be infected with unremovable malware Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious…
Exploits Ransomware Vulnerabilities2 Min Read September 24, 2025 Federal Agency Compromised Via GeoServer Exploit, CISA Reveals A federal agency was compromised last year after failures in vulnerability remediation, incident response and EDR log reviews, according to…
Exploits Linux Vulnerabilities Windows2 Min Read September 24, 2025 Google Chrome Patches Three High-Severity Flaws in V8 Engine Google has released a Stable Channel Update for Desktop with builds 140.0.7339.207/.208 for Windows and Mac and 140.0.7339.207 for Linux. The…
Android Exploits Ransomware Vulnerabilities3 Min Read September 23, 2025 OnePlus leaves researchers on read over Android bug that exposes texts Security researchers report that OnePlus smartphone users remain vulnerable to a critical bug that allows any application to read SMS and MMS…
Exploits Malware Phishing Ransomware2 Min Read September 23, 2025 Attacker Breakout Time Falls to 18 Minutes Threat actors are accelerating their attacks and adopting innovative new ways to circumvent endpoint detection mechanisms, according to a new…
Exploits2 Min Read September 23, 2025 Review: Practical Purple Teaming Practical Purple Teaming is a guide to building stronger collaboration between offensive and defensive security teams. The book focuses on how…