Cloud Security Vulnerability4 Min Read September 24, 2025 Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in a Linux utility called Pandoc as part…
Cloud Security Vulnerability5 Min Read September 22, 2025 Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any…
Vulnerabilities2 Min Read September 19, 2025 HubSpot’s Jinjava Engine Vulnerability Exposes Thousands of Websites to RCE Attacks A newly disclosed flaw in HubSpot’s open-source Jinjava template engine could allow attackers to bypass sandbox restrictions and achieve…
Malware Phishing Vulnerabilities Windows2 Min Read September 19, 2025 CVE-2025-59340: Critical HubSpot’s Jinjava Engine Flaw Exposes Thousands of Websites to RCE HubSpot has issued a security advisory regarding a critical flaw in its Jinjava template engine, which powers thousands of websites and…
DDoS Vulnerabilities2 Min Read September 10, 2025 GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service and SSRF Attacks GitLab has released urgent security patches for its Community (CE) and Enterprise (EE) editions, addressing multiple vulnerabilities,…
Artificial Intelligence Ransomware3 Min Read August 28, 2025 Someone Created First AI-Powered Ransomware Using OpenAI's gpt-oss:20b Model Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock.…
Vulnerability3 Min Read August 26, 2025 Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3 Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows and macOS that could potentially…
Security2 Min Read August 26, 2025 Critical Docker Desktop flaw lets attackers hijack Windows hosts A critical vulnerability in Docker Desktop for Windows and macOS allows compromising the host by running a malicious container, even if…
August 25, 2025 MURKY PANDA: A Trusted-Relationship Threat in the Cloud Since late 2024, CrowdStrike Counter Adversary Operations has observed significant activity conducted by MURKY PANDA, a China-nexus adversary…
Apple Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows10 Min Read August 25, 2025 Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront,…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…
Software Security Vulnerability2 Min Read August 25, 2025 Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows and FreeFlow Core that could allow privilege escalation and…
IoT Research4 Min Read April 9, 2024 Vulnerabilities Identified in LG WebOS As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities.…