CISA flags active exploits in N-able N-central: CVE-2025-8875 (deserialization) and CVE-2025-8876 (command injection).
Xerox patches CVE-2025-8355 and CVE-2025-8356 in FreeFlow Core v8.0.4. Update to v8.0.5 to prevent SSRF and RCE attacks.
The Zelle lawsuit 2025 is making headlines as New York Attorney General Letitia James takes legal action against Early Warning Services (EWS), the creator of the popular digital payment platform. The ...
A new class of USB-based attacks has come to light. These attacks are not just targeting removable devices, but existing, trusted peripherals already connected to systems: Linux webcams. Attackers can ...
A U.S. federal court has sentenced two Estonian nationals to prison for running a massive cryptocurrency HashFlare Ponzi scheme that duped hundreds of thousands of victims worldwide out of more than ...
Ukrainian President Volodymyr Zelenskyy has signed a sweeping cybersecurity bill aimed at bolstering the protection of state networks and critical infrastructure amid an ongoing surge in cyberattacks ...
HPE warns of critical CVE-2025-37093 in StoreOnce software. Vulnerability allows remote access. Patch to version 4.3.11 or later urged for all users.
Anonymous Arabia, a notorious group of hacktivists, has allegedly launched a cyberattack on Columbia University in response to the recent police crackdown on its students. The Columbia University ...
Russia-linked hackers are back at it again, this time with upgraded tools and a stealthier playbook targeting Ukrainian government systems. Ukraine’s national Computer Emergency Response Team has ...
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
Cybersecurity for businesses in 2025: Explore trends, emerging threats, and how to safeguard your business from evolving digital risks.
AI as a National Security Vulnerability At the heart of the “ No Adversarial AI Act ” is the recognition that AI, while transformative, can also be a potent tool for espionage and subversion when ...