Patch Tuesday Vulnerability4 Min Read October 15, 2025 Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come…
Critical Infrastructure Vulnerability2 Min Read October 15, 2025 Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if…
Server Security Vulnerability1 Min Read October 15, 2025 Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations,…
Enterprise Software Vulnerability2 Min Read October 15, 2025 New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS…
Hardware Security Vulnerability3 Min Read October 14, 2025 RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing…
Mobile Security Vulnerability3 Min Read October 14, 2025 New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
Network Security Vulnerability3 Min Read October 11, 2025 Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware…
Network Security Vulnerability2 Min Read October 10, 2025 From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer…
Vulnerability Zero-Day1 Min Read October 10, 2025 From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Vulnerability Website Security2 Min Read October 9, 2025 Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain…
Software Security Vulnerability3 Min Read October 8, 2025 Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol…
Cybersecurity Lua Redis RediShell Security Vulnerability3 Min Read October 7, 2025 13-Year-Old RediShell Vulnerability Puts 60,000 Redis Servers at Risk A new vulnerability in Redis, now known as RediShell (CVE-2025-49844), has put tens of thousands of servers at risk of remote compromise. The…
Cybersecurity GoAnywhere Medusa Ransomware rce Security Vulnerability2 Min Read October 7, 2025 Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft A CVSS 10.0 deserialization vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution is now being actively exploited by…
Cybersecurity Mic-E-Mouse Security Vulnerability2 Min Read October 7, 2025 New Mic-E-Mouse Attack Shows Computer Mice Can Capture Conversations A team of researchers from the University of California, Irvine, has discovered a security risk right on your desk. It turns out that your…
Cloud Security Vulnerability2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Cloud Security Vulnerability2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
Threat Intelligence Vulnerability2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited…
Network Security Vulnerability1 Min Read October 4, 2025 Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login…
IoT Security Vulnerability2 Min Read October 3, 2025 CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded…
Bishop Fox Cybersecurity IoT Privacy Security Vulnerability YoLink YoLink Smart Hub2 Min Read October 2, 2025 $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk Cybersecurity researchers at Bishop Fox have revealed security vulnerabilities in the popular, inexpensive YoLink Smart Hub (v0382), leaving…
AI Artificial Intelligence Cybersecurity Gemini AI Gemini Trifecta Google Security Vulnerability2 Min Read October 2, 2025 Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which…
API Security Vulnerability2 Min Read October 1, 2025 OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if…
Malware Vulnerability2 Min Read October 1, 2025 Hackers Exploit Milesight Routers to Send Phishing SMS to European Users Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in…
ClaimPix Cybersecurity Jeremiah Fowler Leaks Misconfiguration Privacy Security Vulnerability2 Min Read September 30, 2025 US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online A massive collection of data belonging to customers of ClaimPix, an Illinois-based platform for managing auto insurance claims across the…
Artificial Intelligence Vulnerability3 Min Read September 30, 2025 Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Google's Gemini artificial intelligence (AI)…
Vulnerability Zero-Day1 Min Read September 30, 2025 Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since…
Linux Vulnerability2 Min Read September 30, 2025 CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
MCP Server Vulnerability2 Min Read September 29, 2025 First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted…
Threat Intelligence Vulnerability2 Min Read September 26, 2025 Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure Cybersecurity company watchTowr Labs has disclosed that it has "credible evidence" of active exploitation of the recently disclosed security…
Network Security Vulnerability4 Min Read September 26, 2025 Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting…
Vulnerability Zero-Day2 Min Read September 25, 2025 Urgent: Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA)…
AI Security Vulnerability2 Min Read September 25, 2025 Salesforce Patches Critical ForcedLeak Bug Exposing CRM Data via AI Prompt Injection Cybersecurity researchers have disclosed a critical flaw impacting Salesforce Agentforce, a platform for building artificial intelligence (AI)…
AgentForce AI AI agents CRM Cybersecurity ForcedLeak Salesforce Security Vulnerability3 Min Read September 25, 2025 ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data A vulnerability dubbed ForcedLeak was recently discovered in Salesforce Agentforce, an AI-driven system designed to handle complex business…
Cl0p Cybersecurity File Transfer Fortra GoAnywhere Ransomware Security Vulnerability3 Min Read September 25, 2025 Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems Thousands of companies using Fortra’s GoAnywhere Managed File Transfer (MFT) solution are facing an immediate threat of full system…
BRICKSTORM China Cyber Attack Cybersecurity Google Linux Malware Mandiant SaaS Security UNC5221 Vulnerability3 Min Read September 25, 2025 China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity researchers at…
Network Security Vulnerability2 Min Read September 25, 2025 Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software Cisco has warned of a high-severity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary…
Network Security Vulnerability3 Min Read September 24, 2025 Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Cloud Security Vulnerability4 Min Read September 24, 2025 Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part…
Email Security Vulnerability2 Min Read September 24, 2025 State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability Libraesva has released a security update to address a vulnerability in its Email Security Gateway (ESG) solution that it said has been…