Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Android Apple DDoS Ransomware Vulnerabilities2 Min Read August 25, 2025 25W Wireless Charging Arrives: Qi 2.2 Ushers in a New Era of Fast Power Ddos August 24, 2025 The Wireless Power Consortium (WPC) has officially introduced the Qi 2.2 wireless charging standard, offering devices…
Android Apple Cloud Security DDoS Network Phishing Privacy & Compliance Vulnerabilities4 Min Read August 25, 2025 Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by…
August 25, 2025 August 2025 Patch Tuesday: One Publicly Disclosed Zero-Day and 13 Critical Vulnerabilities Among 107 CVEs Microsoft has addressed 107 vulnerabilities in its August 2025 security update release. This month’s patches include fixes for one…
Supply Chain Security4 Min Read August 25, 2025 How Secure Is the Software Supply Chain? Less Secure Than You Might Think. Software is the invisible infrastructure of our world, powering everything from critical systems to everyday devices. But its ubiquity makes…
Malware3 Min Read August 25, 2025 Fake Reservation Links Prey on Weary Travelers Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked…
Linux Malware2 Min Read August 25, 2025 Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and…
Cyber Espionage Vulnerability2 Min Read August 25, 2025 Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has emerged in the wild, putting organizations at risk of…
Cloud Security Vulnerability3 Min Read August 25, 2025 Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware Cybersecurity researchers have lifted the lid on the threat actors’ exploitation of a now-patched security flaw in Microsoft Windows to…
Malware Supply Chain Attack3 Min Read August 25, 2025 Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior…
Network Security Vulnerability2 Min Read August 25, 2025 Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could…
Network Security Vulnerability2 Min Read August 25, 2025 CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known…
Software Security Vulnerability2 Min Read August 25, 2025 Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows and FreeFlow Core that could allow privilege escalation and…
Vulnerability Zero-Day4 Min Read August 25, 2025 Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been…
IoT Research Whitepapers4 Min Read July 30, 2025 Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Whitepapers IoT Research min read Vulnerabilities Identified in Dahua Hero C1 Smart Cameras Bitdefender July 30, 2025 Promo Protect all your…
Apple Linux Vulnerabilities Windows4 Min Read July 10, 2025 CVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systems Update - July 11, 2025: We are making a correction to the Git CLI versions vulnerable to this based on updates to the GitHub advisory around…
Cloud Security Malware Phishing Ransomware11 Min Read April 17, 2025 Datadog threat roundup: Top insights for Q1 2025 As a leading provider in observability and cloud security, Datadog has unique insight into threat actor behavior that targets cloud…
IoT Research3 Min Read May 15, 2024 Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT devices, hunting for vulnerabilities and…