Patch Tuesday Vulnerability4 Min Read October 15, 2025 Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 15, 2025 Capita Fined £14m After 2023 Breach that Hit 6.6 Million People Capita will not appeal a £14m regulatory penalty for security failings that led to a 2023 data breach impacting nearly seven million…
Exploits Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Critical RCE Flaws CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9) Found in Veeam Backup & Replication Veeam Software has released patches addressing three newly disclosed , including two critical Remote Code Execution (RCE) in Veeam Backup…
DDoS Vulnerabilities Windows3 Min Read October 15, 2025 Rockwell Automation Patches Privilege Escalation and Denial-of-Service Flaws Across FactoryTalk and ArmorStart Systems Rockwell Automation has released a series of advisories addressing in several of its FactoryTalk and ArmorStart product lines. These ,…
Exploits Network Vulnerabilities1 Min Read October 14, 2025 FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands Fortinet disclosed a high-severity vulnerability in its FortiOS operating system on October 14, 2025, that could enable local authenticated…
DDoS Malware Ransomware Vulnerabilities9 Min Read October 14, 2025 Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched Microsoft rolled out its October 2025 Patch Tuesday updates, addressing a staggering 172 vulnerabilities across its ecosystem, including four…
Apple Linux Ransomware Vulnerabilities4 Min Read October 14, 2025 CVE Deep Dive : CVE-2025–32463 Sudo “Chroot to Root” — Critical Library Loading Privilege EscalationPublished : Sept 23, 2025 | by : OptPress enter or…
Phishing Vulnerabilities4 Min Read October 13, 2025 Your Alerts Are Increasing Your Cybersecurity Risk At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a…
Cloud Security Network Security2 Min Read October 11, 2025 Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts Cybersecurity company Huntress on Friday warned of "widespread compromise" of SonicWall SSL VPN devices to access multiple customer…
Network Security Vulnerability3 Min Read October 11, 2025 Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
DDoS Network Vulnerabilities Web Security2 Min Read October 11, 2025 Juniper Junos Space October 2025 Vulnerability Fixes On October 9, 2025, Juniper Networks rolled out Junos Space 24.1R4 Patch V1, a broad security update tackling more than 200 vulnerabilities…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Malware Phishing Ransomware Vulnerabilities5 Min Read October 10, 2025 How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
DDoS Linux Malware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot A Russia-aligned hacktivist gang has been tricked into targeting a honeypot disguised as a water treatment utility, cybersecurity company…
Cloud Security DDoS Vulnerabilities Windows2 Min Read October 10, 2025 NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation NVIDIA has released an important software update for its GPU Display Driver, addressing multiple that could lead to code execution, privilege…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
Security2 Min Read October 9, 2025 Hackers now use Velociraptor DFIR tool in ransomware attacks Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and…
Security2 Min Read October 9, 2025 Hacktivists target critical infrastructure, hit decoy plant A pro-Russian hacktivist group called TwoNet pivoted in less than a year from launching distributed denial-of-service (DDoS) attacks to…
Vulnerability Website Security2 Min Read October 9, 2025 Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain…
Cloud Security2 Min Read October 8, 2025 Crimson Collective hackers target AWS cloud instances for data theft The 'Crimson Collective' threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Cloud Security Linux Vulnerabilities Windows2 Min Read October 8, 2025 Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
Cloud Security Phishing Ransomware Vulnerabilities2 Min Read October 8, 2025 Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
DDoS Exploits Vulnerabilities3 Min Read October 8, 2025 Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Apple Linux Vulnerabilities Windows2 Min Read October 5, 2025 Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Cloud Security Phishing Vulnerabilities Web Security2 Min Read October 3, 2025 Yoast SEO Premium Flaw: Stored XSS Bug (CVE-2025-11241) Exposes Millions of WordPress Sites A new has been disclosed in the widely used Yoast SEO Premium plugin for WordPress, potentially exposing millions of websites to cross-site…
Android Exploits Linux Vulnerabilities2 Min Read October 3, 2025 Researcher Details Zero-Day Linux/Android Kernel Flaw (CVE-2025-38352) researcher StreyPaws has published an in-depth analysis of CVE-2025-38352, a Time-of-Check to Time-of-Use (TOCTOU) race condition in the…
Exploits Linux Vulnerabilities Windows2 Min Read October 2, 2025 Chrome 141 Stable Channel Update Patches High-Severity Vulnerabilities (CVE-2025-11205 & CVE-2025-11206) The Chrome team has announced the promotion of Chrome 141 to the Stable Channel for Windows, Mac, and Linux. The release—version…
Exploits Linux Vulnerabilities2 Min Read October 1, 2025 Red Hat Openshift AI Service Vulnerability Allow Attackers to Take Control of the Infrastructure Red Hat published security advisory CVE-2025-10725, detailing an Important severity flaw in the OpenShift AI Service that could enable…
Exploits Vulnerabilities2 Min Read October 1, 2025 CVE-2025-10725 (CVSS 9.9): Red Hat OpenShift AI Privilege Escalation Flaw Could Lead to Full Cluster Compromise The Red Hat team has disclosed a serious in Red Hat OpenShift AI, a platform designed to build, deploy, and manage machine learning (ML)…
DDoS Exploits Vulnerabilities Windows2 Min Read October 1, 2025 NVIDIA Patches Multi Flaws in Delegated License Service, Allows Unauthenticated Access and DoS NVIDIA has issued a bulletin addressing multiple across the NVIDIA App for Windows and the Delegated License Service (DLS) component of the…
Cloud Security Vulnerabilities Windows2 Min Read October 1, 2025 Apache Kylin Flaw: Authentication Bypass and SSRF Vulnerabilities Found in Big Data Platform The Apache Software Foundation has published a new advisory disclosing three in Apache Kylin, a high-concurrency OLAP engine widely used for…
Supply Chain Vulnerabilities3 Min Read September 30, 2025 Achieving Crypto Agility Through eFPGA: A Prerequisite for Secure ASIC and SoC Designs In an era where digital threats evolve daily and quantum computing looms on the horizon, the need for true crypto agility has never been more…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Exploits Linux Ransomware Vulnerabilities2 Min Read September 30, 2025 CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks CISA has issued an urgent advisory regarding a critical vulnerability in the Linux and Unix sudo utility CVE-2025-32463 that is currently…
Security2 Min Read September 30, 2025 Broadcom fixes high-severity VMware NSX bugs reported by NSA Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency…