Exploits Zero Trust7 Min Read September 26, 2025 Customer Authentication Challenges That Impact Your Organization’s Security Posture Introduction In today’s cybersecurity landscape, CISOs face the challenge of securing data while managing costs effectively. As cyber…
Enterprise Security Security Validation4 Min Read September 26, 2025 Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions Car makers don't trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don't…
Security2 Min Read September 24, 2025 New Supermicro BMC flaws can create persistent backdoors Two vulnerabilities affecting the firmware of Supermicro hardware, including Baseboard Management Controller (BMC) allow attackers to…
Security2 Min Read September 24, 2025 Cisco warns of IOS zero-day vulnerability exploited in attacks Cisco has released security updates to address a high-severity zero-day vulnerability in Cisco IOS and IOS XE Software that is currently being…
Mobile Security3 Min Read September 24, 2025 Unpatched flaw in OnePlus phones lets rogue apps text messages A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to access SMS data…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Exploits Vulnerabilities1 Min Read September 24, 2025 SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399) SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular…
DDoS Linux Vulnerabilities Windows3 Min Read September 24, 2025 Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System Google has issued an urgent security update for its Chrome web browser to address three high-severity vulnerabilities that could allow…
Exploits Linux Vulnerabilities Windows2 Min Read September 24, 2025 Google Chrome Patches Three High-Severity Flaws in V8 Engine Google has released a Stable Channel Update for Desktop with builds 140.0.7339.207/.208 for Windows and Mac and 140.0.7339.207 for Linux. The…
Security2 Min Read September 23, 2025 CISA says hackers breached federal agency using GeoServer exploit CISA has revealed that attackers breached the network of an unnamed U.S. federal civilian executive branch (FCEB) agency last year after…
Security2 Min Read September 22, 2025 American Archive of Public Broadcasting fixes bug exposing restricted media A vulnerability in the American Archive of Public Broadcasting's website allowed downloading of protected and private media for…
Security2 Min Read September 22, 2025 New EDR-Freeze tool uses Windows WER to suspend security software A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with…
Data Breach Malware Ransomware Vulnerabilities4 Min Read September 22, 2025 VMScape attack | Kaspersky official blog A team of researchers at the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has published a research paper demonstrating how a…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Cloud Security Exploits Vulnerabilities Windows3 Min Read September 22, 2025 Microsoft Entra ID Exposed: Actor Token Flaw Enables Stealthy Global Admin Takeove A newly disclosed vulnerability tracked as CVE-2025-55241 has been reported. The flaw, discovered by an independent researcher and disclosed…
Artificial Intelligence Malware3 Min Read September 20, 2025 Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Cybersecurity researchers have discovered what they say is the earliest example known to date of a malware with that bakes in Large Language…
Artificial Intelligence Cloud Security3 Min Read September 20, 2025 ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak…
Exploits Malware Mobile Security Vulnerabilities2 Min Read September 19, 2025 Ivanti EPMM holes let miscreants plant shady listeners, CISA says An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed…
Exploits Malware Ransomware Vulnerabilities3 Min Read September 19, 2025 CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting…
Data Breach Vulnerability2 Min Read September 19, 2025 CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in…
Malware Phishing Vulnerabilities Windows2 Min Read September 19, 2025 CVE-2025-59340: Critical HubSpot’s Jinjava Engine Flaw Exposes Thousands of Websites to RCE HubSpot has issued a security advisory regarding a critical flaw in its Jinjava template engine, which powers thousands of websites and…
Exploits Network Ransomware Vulnerabilities2 Min Read September 19, 2025 CVE-2025-10035 (CVSS 10): Critical Deserialization Flaw in GoAnywhere MFT Exposes Enterprises to Remote Exploitation A newly disclosed vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) platform has been assigned CVE-2025-10035, carrying…
Browser Security Vulnerability2 Min Read September 18, 2025 Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities, including one that it said has been…
Exploits Linux Vulnerabilities Windows2 Min Read September 18, 2025 Chrome Emergency Update: Zero-Day (CVE-2025-10585) in V8 Exploited in the Wild Google has released a Stable Channel update to version 140.0.7339.185/.186 for Windows and Mac, and 140.0.7339.185 for Linux, addressing four…
Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Exploits Malware Phishing Windows0 Min Read September 17, 2025 FileFix Campaign Using Steganography and Multistage Payloads A rare in-the-wild FileFix campaign has been observed by cybersecurity researchers, which hides a second-stage PowerShell script and encrypted…
Malware Social Engineering3 Min Read September 16, 2025 New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the…
Security3 Min Read September 16, 2025 New FileFix attack uses steganography to drop StealC malware A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing…
Security3 Min Read September 15, 2025 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK…
Malware Ransomware Vulnerabilities Windows2 Min Read September 15, 2025 HybridPetya Mimics NotPetya, Adds UEFI Compromise A newly identified ransomware strain called HybridPetya has appeared on the VirusTotal platform. Uploaded in February 2025, the sample showed…
Exploits Vulnerabilities2 Min Read September 15, 2025 CVE-2025-58434: Critical FlowiseAI Flaw Enables Full Account Takeover A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of…
Data Breach Exploits Network Vulnerabilities2 Min Read September 15, 2025 PoC Available: FlowiseAI Flaw (CVE-2025-58434) Allows Full Account Takeover (CVSS 9.8) The open-source generative AI development platform FlowiseAI, widely used for building AI agents and LLM workflows, has been found vulnerable…
Botnets Exploits Malware Vulnerabilities2 Min Read September 15, 2025 Digiever NVR Flaws (CVE-2025-10264, CVE-2025-10265) Let Hackers Steal Credentials & Take Control The Taiwan Computer Emergency Response Team (TWCERT/CC) has issued a vulnerability note warning of two critical security flaws in…
Exploits Malware Ransomware Vulnerabilities2 Min Read September 13, 2025 HybridPetya: (Proof-of-concept?) ransomware can bypass UEFI Secure Boot ESET researchers have discovered HybridPetya, a bootkit-and-ransomware combo that’s a copycat of the infamous Petya/NotPetya malware,…
Linux Malware Ransomware Windows4 Min Read September 12, 2025 HybridPetya: More proof that Secure Boot bypasses are not just an urban legend A new ransomware strain dubbed HybridPetya was able to exploit a patched vulnerability to bypass Unified Extensible Firmware Interface (UEFI)…
DDoS Malware Ransomware Vulnerabilities1 Min Read September 12, 2025 Apple Issues New Spyware Alerts for French Officials and Journalists Ddos September 12, 2025 Apple occasionally issues spyware attack notifications, publicly disclosing on its website which countries or regions…
Data Breach DDoS Vulnerabilities Windows2 Min Read September 12, 2025 CVE-2025-10127 (CVSS 9.8): Critical Daikin Flaw Could Give Hackers Full System Access Ddos September 12, 2025 The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory about a critical flaw in…
DDoS Exploits Phishing Vulnerabilities2 Min Read September 12, 2025 CVE-2025-58754: Axios Vulnerability Puts Node.js Processes at Risk of DoS Attacks Ddos September 12, 2025 The Axios project has released a security advisory for a newly discovered vulnerability affecting its popular…
Cloud Security Exploits Vulnerabilities Web Security5 Min Read August 26, 2025 CVE-2025-52882: WebSocket authentication bypass in Claude Code extensions A critical vulnerability in Claude Code for Visual Studio Code (VS Code) and other IDE extensions allowed malicious websites to connect to…
IoT Research Whitepapers4 Min Read July 30, 2025 Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Whitepapers IoT Research min read Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Bitdefender July 30, 2025 Promo Protect all your…