Email Security Exploits Network Vulnerabilities2 Min Read September 23, 2025 CVE-2025-59689: Libraesva ESG Command Injection Flaw Exploited in the Wild Libraesva has released an urgent security advisory addressing a command injection vulnerability (CVE-2025-59689) in its Email Security Gateway…
Data Breach Exploits IoT Security Ransomware7 Min Read September 22, 2025 Why the Cybersecurity Talent Shortage is a Global Threat In the era of digital transformation, where data flows across borders and devices, data security is paramount. Cyberattacks are no longer…
Cloud Security Exploits Vulnerabilities Windows3 Min Read September 22, 2025 Microsoft Entra ID Exposed: Actor Token Flaw Enables Stealthy Global Admin Takeove A newly disclosed vulnerability tracked as CVE-2025-55241 has been reported. The flaw, discovered by an independent researcher and disclosed…
Exploits Malware Phishing Ransomware4 Min Read September 21, 2025 Countering The Adaptive Playbook of Modern Threat Actors The cybersecurity landscape has seen a substantial threat vector transformation. While malware and ransomware continue to be relevant threats,…
Exploits Nation-state Ransomware Vulnerabilities3 Min Read September 20, 2025 Why “Time to Patch” Is the Cybersecurity KPI That Matters Most The way your organization manages its risk tolerance and regulatory factors are key performance indicators (KPIs) for assessing your…
Exploits Ransomware Vulnerabilities2 Min Read September 20, 2025 GoAnywhere MFT Hit By Perfect 10 RCE IntroductionOn September 18, 2025, Fortra dropped urgent security advisories for users of their flagship GoAnywhere Managed File Transfer…
Exploits Malware Mobile Security Vulnerabilities2 Min Read September 19, 2025 Ivanti EPMM holes let miscreants plant shady listeners, CISA says An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed…
Exploits Nation-state Ransomware Vulnerabilities4 Min Read September 19, 2025 How the U.S. Can Strengthen Its Cyber Defenses Against Nation-State Threats The American power grid is not just the backbone of modern life. It’s a high-value target in our new era of geopolitical conflict. As…
Exploits Malware Ransomware Vulnerabilities3 Min Read September 19, 2025 CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting…
Exploits Ransomware Vulnerabilities2 Min Read September 19, 2025 Ding ding: Fortra rings the perfect-10 bell over latest GoAnywhere MFT bug Budding ransomware crooks have another shot at exploiting Fortra's GoAnywhere MFT product now that a new 10/10 severity vulnerability needs…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation A deserialization flaw in the License Servlet component of Fortra GoAnywhere Managed File Transfer (MFT) platform. Identified as…
Exploits Malware Ransomware Vulnerabilities4 Min Read September 19, 2025 CISA Warns of New Malware Campaign Exploiting Ivanti EPMM Vulnerabilities The Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR), highlighting a new attack trend…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 CVE-2025-10035 (CVSS 10): Critical Deserialization Flaw in GoAnywhere MFT Exposes Enterprises to Remote Exploitation A newly disclosed vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) platform has been assigned CVE-2025-10035, carrying…
Data Breach Exploits Network Ransomware3 Min Read September 18, 2025 SonicWall says attackers compromised some firewall configuration backup files Between attackers exploiting 0-day and n-day vulnerabilities in the company’s firewalls and Secure Mobile Access appliances, SonicWall…
Android Apple Exploits Malware0 Min Read September 18, 2025 1 in 3 Android Apps Leak Sensitive Data A significant share of mobile applications are exposing sensitive information through insecure APIs, leaving users and businesses vulnerable…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Exploits Ransomware0 Min Read September 18, 2025 NCA Singles Out “The Com” as it Chairs Five Eyes Group The UK’s leading serious and organized crime agency has said it will harness the full force of law enforcement across Five Eyes countries to…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Exploits IoT Security Web Security Windows6 Min Read September 17, 2025 How LLMs can be compromised in 2025 | Kaspersky official blog Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the…
Exploits Malware Phishing Windows0 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Cloud Security Exploits Vulnerabilities0 Min Read September 17, 2025 Critical CVEs in Chaos-Mesh Enable In-Cluster Code Execution Multiple CVEs in the Chaos-Mesh platform have been discovered, including three critical vulnerabilities that allow in-cluster attackers to run…
Exploits Mobile Security Network Vulnerabilities2 Min Read September 17, 2025 Critical WatchGuard Vulnerability Allows Unauthenticated Attacker to Execute Arbitrary Code A critical vulnerability has been discovered in WatchGuard’s Firebox firewalls, which could allow a remote, unauthenticated attacker to…
Apple Exploits Linux Vulnerabilities2 Min Read September 17, 2025 Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Apple has released iOS 16.7.12 and iPadOS 16.7.12 on September 15, 2025, delivering critical security updates to older-generation…
Cloud Security Exploits Malware Vulnerabilities2 Min Read September 17, 2025 Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Exploits Malware Network Vulnerabilities2 Min Read September 16, 2025 WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…
Exploits Linux Malware Vulnerabilities2 Min Read September 16, 2025 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities A 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities, achieving remote code execution on a two-year-out-of-date Linux 6.1.45…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Exploits Vulnerabilities2 Min Read September 15, 2025 CVE-2025-58434: Critical FlowiseAI Flaw Enables Full Account Takeover A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of…
Exploits Vulnerabilities2 Min Read September 15, 2025 IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Exploits Network Vulnerabilities Web Security3 Min Read September 15, 2025 FlowiseAI Password Reset Token Vulnerability Allows Account Takeover A critical vulnerability affecting FlowiseAI’s Flowise platform has been disclosed, revealing a severe authentication bypass flaw that…
DDoS Exploits Linux Vulnerabilities2 Min Read September 15, 2025 Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…
Data Breach Exploits Network Vulnerabilities2 Min Read September 15, 2025 PoC Available: FlowiseAI Flaw (CVE-2025-58434) Allows Full Account Takeover (CVSS 9.8) The open-source generative AI development platform FlowiseAI, widely used for building AI agents and LLM workflows, has been found vulnerable…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Exploits Ransomware Vulnerabilities2 Min Read September 15, 2025 CVE-2025-9556 (CVSS 9.8):Critical Vulnerability in LangChainGo Puts LLM Apps at Risk The rise of large language model (LLM) applications has made frameworks like LangChain and its ports foundational for developers worldwide.…
Exploits Network Phishing5 Min Read September 14, 2025 Beyond the Firewall: Protecting Your Marketing Department from Cyber Threats and Safeguarding Digital Assets Digital media created more opportunities for companies to engage with consumers than ever before, but such increased interconnectedness has a…
Exploits ICS/OT Vulnerabilities Windows2 Min Read September 13, 2025 CISA Warns of Attacks on DELMIA Manufacturing Software Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Android Exploits Vulnerabilities2 Min Read September 13, 2025 Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…