CVE-2025-27915 exploit ics XSS Zero-Day3 Min Read October 5, 2025 Hackers exploited Zimbra flaw as zero-day using iCalendar files Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in…
DDoS Exploits Phishing Vulnerabilities2 Min Read October 3, 2025 Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform.…
Cloud Security Phishing Vulnerabilities Web Security2 Min Read October 3, 2025 Yoast SEO Premium Flaw: Stored XSS Bug (CVE-2025-11241) Exposes Millions of WordPress Sites A new has been disclosed in the widely used Yoast SEO Premium plugin for WordPress, potentially exposing millions of websites to cross-site…
Microsoft Security2 Min Read October 2, 2025 Microsoft Outlook stops displaying inline SVG images used in attacks Microsoft says Outlook for Web and the new Outlook for Windows will no longer display risky inline SVG images that are being used in attacks.…
Security2 Min Read October 2, 2025 HackerOne paid $81 million in bug bounties over the past year Bug bounty platform HackerOne has paid $81 million in rewards to white-hat hackers worldwide over the past 12 months. HackerOne manages over…
DDoS Phishing Vulnerabilities Web Security3 Min Read October 2, 2025 Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to…
DDoS Phishing Ransomware Vulnerabilities3 Min Read October 2, 2025 Splunk Fixes Six Flaws, Including Unauthenticated SSRF and XSS Vulnerabilities in Enterprise Platform Splunk has released a series of advisories addressing six in Splunk Enterprise and Splunk Cloud Platform, ranging from medium to high…
Cloud Security DDoS Vulnerabilities Web Security2 Min Read October 2, 2025 DoS Flaws in Argo CD: Unauthenticated Attackers Can Crash Kubernetes Server with Single Request The Argo CD project has released patches addressing several denial-of-service (DoS) that could allow attackers to crash the argocd-server…
Exploits Ransomware Social Engineering2 Min Read September 25, 2025 Critical Vulnerability in Salesforce AgentForce Exposed A critical vulnerability chain in Salesforce's AI-powered AgentForce platform has been discovered by cybersecurity researchers. The flaw,…
Ransomware Vulnerabilities Web Security2 Min Read September 25, 2025 Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by…
Security2 Min Read September 24, 2025 Cisco warns of IOS zero-day vulnerability exploited in attacks Cisco has released security updates to address a high-severity zero-day vulnerability in Cisco IOS and IOS XE Software that is currently being…
Payment Security Web Security5 Min Read September 24, 2025 iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit…
Vulnerabilities Web Security Windows2 Min Read September 24, 2025 CVE-2025-59545: Critical XSS Flaw in DNN Software Puts 750,000 Websites at Risk DNN Software has issued a security advisory warning of a critical stored cross-site scripting (XSS) vulnerability in its Prompt module,…
Vulnerabilities Web Security Windows2 Min Read September 23, 2025 CVE-2025-9125: Cross-Site Scripting Flaw in Lectora Courses Puts E-Learning Platforms at Risk The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of a cross-site scripting (XSS) flaw affecting Lectora, a…
Data Breach Linux Web Security3 Min Read September 22, 2025 JWT Warfare: Obfuscation, Cracking, and Red Team Exploits | Cyber Codex What is JWT?JWT (JSON Web Token) is a compact, URL-safe method of representing claims between two parties. It is used mostly in stateless…
Exploits IoT Security Web Security Windows6 Min Read September 17, 2025 How LLMs can be compromised in 2025 | Kaspersky official blog Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the…
Data Breach Exploits Network Vulnerabilities2 Min Read September 15, 2025 PoC Available: FlowiseAI Flaw (CVE-2025-58434) Allows Full Account Takeover (CVSS 9.8) The open-source generative AI development platform FlowiseAI, widely used for building AI agents and LLM workflows, has been found vulnerable…
AI Security Vulnerability4 Min Read September 12, 2025 Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a…
DDoS Linux Vulnerabilities Web Security3 Min Read September 11, 2025 SAP Issues Critical Security Patch for NetWeaver and Other Products, Warns of CVE-2025-42944 SAP has released a new security update addressing a broad range of vulnerabilities across its product ecosystem. Among the most alarming is a…
DDoS Vulnerabilities Web Security Windows2 Min Read September 11, 2025 High-Severity Flaws in Sunshine for Windows Allow Privilege Escalation The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of two critical local security flaws affecting Sunshine for…
Data Breach DDoS Vulnerabilities2 Min Read September 10, 2025 GitLab Urges Immediate Update for Two High-Severity Flaws GitLab has released new versions of its Community and Enterprise Editions to address several security vulnerabilities, including two critical…
Security2 Min Read September 9, 2025 Kosovo hacker pleads guilty to running BlackDB cybercrime marketplace Kosovo national Liridon Masurica has pleaded guilty to running BlackDB.cc, a cybercrime marketplace that has been active since 2018. Kosovar…
Apple DDoS Ransomware Vulnerabilities Windows2 Min Read September 9, 2025 Zoom Security Update – Patch for Multiple Vulnerabilities in Clients for Windows and macOS Zoom released a security update addressing multiple vulnerabilities in its software, including Zoom Workplace and various clients for Windows…
DDoS Vulnerabilities3 Min Read September 9, 2025 SAP Security Patch Day September 2025 – 21 Vulnerabilities and 4 Critical One’s Patched As part of its scheduled security maintenance, SAP released its September 2025 Patch Day notes, addressing a total of 21 new vulnerabilities…
Ransomware Vulnerabilities3 Min Read September 9, 2025 SAP Patch Tuesday: Key Vulnerabilities in September 2025 The September 2025 SAP Patch Tuesday brings a critical batch of security updates addressing a diverse portfolio of vulnerabilities across…
Cybersecurity Hacking News25 Min Read September 8, 2025 ⚡ Weekly Recap: Drift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT teams,…
Vulnerabilities3 Min Read August 28, 2025 Vulnerabilities in OpenSolution QuickCMS software CVE ID CVE-2025-54540 Publication date 28 August 2025 Vendor OpenSolution Product QuickCMS Vulnerable versions 6.8 Vulnerability type (CWE)…
Artificial Intelligence Cyber Attack4 Min Read August 28, 2025 Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot…
Network Vulnerabilities2 Min Read August 28, 2025 IPFire Web-Based Firewall Interface Allows Authenticated Administrator to Inject Persistent JavaScript A stored cross-site scripting (XSS) flaw identified in IPFire 2.29’s web-based firewall interface (firewall.cgi). Tracked as…
Cybersecurity Recap22 Min Read August 25, 2025 Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage,…