Malware Mobile Security Phishing Vulnerabilities2 Min Read September 19, 2025 CISA Warns of Malicious Listener Malware Exploiting Ivanti Endpoint Manager Mobile The Cybersecurity and Infrastructure Security Agency (CISA) has published a new Malware Analysis Report (MAR) detailing how threat actors are…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 CVE-2025-10035 (CVSS 10): Critical Deserialization Flaw in GoAnywhere MFT Exposes Enterprises to Remote Exploitation A newly disclosed vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) platform has been assigned CVE-2025-10035, carrying…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 19, 2025 MuddyWater APT Shifts Tactics to Custom Malware Group-IB analysts have released new intelligence on MuddyWater, the Iranian state-sponsored APT linked to Tehran’s Ministry of…
Data Breach Ransomware Vulnerabilities Windows2 Min Read September 18, 2025 GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware The cyberthreat landscape has witnessed the emergence of another sophisticated ransomware operation as GOLD SALEM, a new threat actor group…
Linux Malware Vulnerabilities Windows2 Min Read September 18, 2025 Google pushes emergency patch for Chrome 0-day – check your browser version now Google pushed an emergency patch for a high-severity Chrome flaw, already under active exploitation. So it's time to make sure you're running…
Cloud Security Vulnerabilities Windows3 Min Read September 18, 2025 Critical Microsoft’s Entra ID Vulnerability Allows Attackers to Gain Complete Administrative Control A critical vulnerability in Microsoft’s Entra ID could have allowed an attacker to gain complete administrative control over any tenant…
Data Breach Network Ransomware Vulnerabilities0 Min Read September 18, 2025 SonicWall Discloses Compromise of Cloud Backup Service Cybersecurity vendor SonicWall has disclosed a security incident affecting its cloud backup service for firewalls. An investigation found that…
Exploits Linux Vulnerabilities Windows1 Min Read September 18, 2025 Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585) Google has released a security update for the Chrome stable channel to fix a zero‑day vulnerability (CVE-2025-10585) reported by its…
Apple Linux Vulnerabilities Windows3 Min Read September 18, 2025 Google Confirms Real-World Attacks on Chrome Vulnerability CVE-2025-10585 Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
ICS/OT IoT Security Malware Vulnerabilities2 Min Read September 18, 2025 Critical Vulnerabilities Discovered in Planet Technology Industrial Cellular Gateways The Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) has issued a security advisory warning of two critical…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Cloud Security Exploits Vulnerabilities0 Min Read September 17, 2025 Critical CVEs in Chaos-Mesh Enable In-Cluster Code Execution Multiple CVEs in the Chaos-Mesh platform have been discovered, including three critical vulnerabilities that allow in-cluster attackers to run…
Exploits Mobile Security Network Vulnerabilities2 Min Read September 17, 2025 Critical WatchGuard Vulnerability Allows Unauthenticated Attacker to Execute Arbitrary Code A critical vulnerability has been discovered in WatchGuard’s Firebox firewalls, which could allow a remote, unauthenticated attacker to…
Apple Linux Nation-state Vulnerabilities2 Min Read September 17, 2025 CVE-2025-43300: Apple’s Critical Zero-Day ImageIO Vulnerability IntroductionSecurity researchers and Apple users alike are on high alert following the discovery and active exploitation of…
Apple Exploits Linux Vulnerabilities2 Min Read September 17, 2025 Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad Apple has released iOS 16.7.12 and iPadOS 16.7.12 on September 15, 2025, delivering critical security updates to older-generation…
Cloud Security Exploits Malware Vulnerabilities2 Min Read September 17, 2025 Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault…
Apple Malware Vulnerabilities Windows2 Min Read September 16, 2025 Apple 0-day likely used in spy attacks affected devices as old as iPhone 8 Apple backported a fix to older iPhones and iPads for a serious bug it patched last month – but only after it may have been exploited in…
Network Ransomware Vulnerabilities Windows3 Min Read September 16, 2025 Ransomware attackers used incorrectly stored recovery codes to disable EDR agents All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any…
Exploits Malware Network Vulnerabilities2 Min Read September 16, 2025 WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login A critical authentication bypass vulnerability in the Case Theme User WordPress plugin has emerged as a significant security threat, allowing…
Vulnerabilities2 Min Read September 16, 2025 Vulnerabilities in Sparkle software CVE ID CVE-2025-10015 Publication date 16 September 2025 Vendor Sparkle Project Product Sparkle Vulnerable versions All before 2.7.2…
Apple Linux Vulnerabilities Windows2 Min Read September 16, 2025 Chrome’s New Preloading is a Game-Changer Google has long experimented with prerendering technology in Chrome to accelerate page loading by rendering content in advance so that pages…
Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
DDoS Linux Ransomware Vulnerabilities2 Min Read September 16, 2025 Apple Releases iOS 26: Key Updates and Vulnerability Patches On September 15, 2025, Apple officially rolled out iOS 26 and iPadOS 26, bringing a fresh set of features and critical security fixes aimed at…
Data Breach Phishing Ransomware Vulnerabilities8 Min Read September 16, 2025 RevengeHotels: a new wave of attacks leveraging LLMs and VenomRAT Background RevengeHotels, also known as TA558, is a threat group that has been active since 2015, stealing credit card data from hotel guests…
DDoS Malware Ransomware Vulnerabilities0 Min Read September 16, 2025 API Threats Surge to 40,000 Incidents in 1H 2025 The financial services, telecoms and travel sectors were in the crosshairs of threat actors in the first half of the year, after Thales…
Exploits Linux Malware Vulnerabilities2 Min Read September 16, 2025 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities A 0-Click Linux Kernel KSMBD RCE Exploit From N-Day Vulnerabilities, achieving remote code execution on a two-year-out-of-date Linux 6.1.45…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Malware Phishing Ransomware Vulnerabilities9 Min Read September 15, 2025 Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a…
Vulnerabilities2 Min Read September 15, 2025 Critical LangChainGo Vulnerability Let Attackers Access Sensitive Files by Injecting Malicious Prompts A high-severity vulnerability was identified in LangChainGo, the Go implementation of the popular LLM orchestration framework LangChain. …
Exploits Vulnerabilities2 Min Read September 15, 2025 CVE-2025-58434: Critical FlowiseAI Flaw Enables Full Account Takeover A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of…
Exploits Vulnerabilities2 Min Read September 15, 2025 IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Exploits Network Vulnerabilities Web Security3 Min Read September 15, 2025 FlowiseAI Password Reset Token Vulnerability Allows Account Takeover A critical vulnerability affecting FlowiseAI’s Flowise platform has been disclosed, revealing a severe authentication bypass flaw that…
DDoS Exploits Linux Vulnerabilities2 Min Read September 15, 2025 Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Two critical vulnerabilities have been discovered in the Linux Common Unix Printing System (CUPS), exposing millions of systems to remote…
Data Breach Exploits Network Vulnerabilities2 Min Read September 15, 2025 PoC Available: FlowiseAI Flaw (CVE-2025-58434) Allows Full Account Takeover (CVSS 9.8) The open-source generative AI development platform FlowiseAI, widely used for building AI agents and LLM workflows, has been found vulnerable…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Exploits Ransomware Vulnerabilities2 Min Read September 15, 2025 CVE-2025-9556 (CVSS 9.8):Critical Vulnerability in LangChainGo Puts LLM Apps at Risk The rise of large language model (LLM) applications has made frameworks like LangChain and its ports foundational for developers worldwide.…
Linux Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 Google Chrome Patches Critical Security Flaws in September 2025 Update In early September 2025, Google released an important security update for its Chrome browser—version 140.0.7339.127—to patch two…
Exploits ICS/OT Vulnerabilities Windows2 Min Read September 13, 2025 CISA Warns of Attacks on DELMIA Manufacturing Software Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its…