CVE-2025-25257 is a critical remote code execution flaw in FortiWeb's Fabric Connector, allowing attackers to inject SQL commands via HTTP/S…
Read More »Security
Stellar Cyber's 6.0.0 update introduces AI-powered automation, including natural language threat hunting and automated phishing triage, to enhance threat detection…
Read More »The UK's NCSC warns businesses and individuals to upgrade from Windows 10 to Windows 11 before October 2025 to avoid…
Read More »Louis Vuitton UK confirmed a data breach exposing customer details like names, contact info, and purchase history, though payment data…
Read More »Post-quantum cryptography is gaining urgency due to upcoming government mandates, and the open-source tool pqcscan helps organizations assess their systems'…
Read More »Team Group's P250Q-M80 SSD features Intelligent Dual-Mode Data Destruction, offering both software-based wiping and a hardware-based self-destruct option that physically…
Read More »A critical remote code execution vulnerability (CVE-2025-47812) in Wing FTP Server is being actively exploited, allowing attackers to execute arbitrary…
Read More »McDonald's job application chatbot, McHire, exposed sensitive data from over 64 million interactions due to weak credentials ("123456" login) and…
Read More »A critical vulnerability (CVE-2025-25257, 9.8/10 severity) in Fortinet's FortiWeb WAF allows unauthenticated remote code execution via SQL injection, requiring immediate…
Read More »A zero-day vulnerability in AI coding tools (e.g., Cursor, Windsurf) exposed developers to machine hijacking via compromised extensions, with attackers…
Read More »A critical remote code execution flaw (CVE-2025-47812) in Wing FTP Server is being actively exploited, allowing unauthenticated attackers to execute…
Read More »Federal agencies and businesses using Citrix NetScaler systems must urgently patch **CVE-2025-5777** after CISA confirmed active attacks, issuing a strict…
Read More »A cyber espionage group linked to India targeted Italian diplomatic networks using deceptive emails with malicious Google Drive links, marking…
Read More »Thousands of Ruckus Networks devices are exposed to critical unpatched vulnerabilities, allowing attackers to take control of enterprise wireless environments.…
Read More »Financial institutions are strengthening cybersecurity but face risks from less-secure third-party vendors, creating hidden vulnerabilities in their supply chains. Cybercriminals…
Read More »Four individuals linked to the hacking group Scattered Spider were arrested for cyberattacks on UK retailers, causing £300 million in…
Read More »The cybersecurity landscape is evolving with new solutions like Cynomi's enhanced platform for business impact analysis and continuity planning, enabling…
Read More »Microsoft is launching Quick Machine Recovery (QMR) for Windows 11, an automated self-repair feature that diagnoses and fixes boot failures…
Read More »Metadata analysis reveals the "raw" surveillance footage of Jeffrey Epstein's prison cell was edited using Adobe Premiere Pro before release,…
Read More »Federal agencies are urgently addressing a critical Citrix vulnerability, dubbed "Citrix Bleed 2," which allows hackers to steal credentials and…
Read More »