Topic: software patching

  • Test Updates Safely: CyDeploy's System Replica at Disrupt 2025

    Test Updates Safely: CyDeploy's System Replica at Disrupt 2025

    CyDeploy creates a digital twin of critical systems using machine learning, enabling safe testing of updates to patch vulnerabilities without disrupting operations. The platform combines automated data capture with human oversight, allowing system administrators to verify accuracy and accelerate ...

    Read More »
  • Hackers Target Unpatched Fortinet Flaws After Fix

    Hackers Target Unpatched Fortinet Flaws After Fix

    Attackers are exploiting two critical authentication bypass vulnerabilities (CVE-2025-59718 & CVE-2025-59719) in Fortinet products, gaining administrative access to steal sensitive system configuration files. The theft of these configuration files poses a severe risk, exposing network details and...

    Read More »
  • Critical "Ni8mare" Bug Allows Hackers to Take Over n8n Servers

    Critical "Ni8mare" Bug Allows Hackers to Take Over n8n Servers

    A critical, maximum-severity vulnerability (CVSS 10.0) in n8n allows unauthenticated remote attackers to take control of servers, posing a major risk due to the platform's widespread use and integration with sensitive enterprise systems. The flaw, named "Ni8mare," is a path traversal issue where ...

    Read More »
  • Gladinet patches critical zero-day flaw in file-sharing software

    Gladinet patches critical zero-day flaw in file-sharing software

    Gladinet has released a critical security update for CentreStack to address CVE-2025-11371, a zero-day vulnerability that allowed attackers to bypass protections and execute remote code on systems. The flaw, discovered by Huntress, involved inadequate input sanitization enabling directory travers...

    Read More »
  • Hackers Still Exploit WinRAR Flaw, Mandiant Reports

    Hackers Still Exploit WinRAR Flaw, Mandiant Reports

    A critical WinRAR vulnerability (CVE-2025-8088) is being actively exploited by state-sponsored and criminal hackers, despite a patch being available for over six months. The exploit hides malicious payloads within archive files to execute automatically upon user login, with attacks linked to a si...

    Read More »