Threat actors with ties to North Korea have likely become the latest to exploit…
Vulnerability
-
-
Vulnerability
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
by adminby adminGoogle on Monday announced a set of new security features in Chrome, following the…
-
Vulnerability
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
by adminby adminA critical security flaw in the Sneeit Framework plugin for WordPress is being actively…
-
Vulnerability
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
by adminby adminDec 08, 2025Ravie LakshmananNetwork Security / Vulnerability The Iranian hacking group known as MuddyWater…
-
Vulnerability
Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
by adminby adminDec 06, 2025Ravie LakshmananAI Security / Vulnerability Over 30 security vulnerabilities have been disclosed…
-
Vulnerability
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
by adminby adminDec 06, 2025Ravie LakshmananVulnerability / Patch Management The U.S. Cybersecurity and Infrastructure Security Agency…
-
Vulnerability
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
by adminby adminDec 05, 2025Ravie LakshmananApplication Security / Vulnerability A critical security flaw has been disclosed…
-
Vulnerability
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
by adminby adminDec 05, 2025Ravie LakshmananVulnerability / Software Security Two hacking groups with ties to China…
-
Vulnerability
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
by adminby adminDec 05, 2025Ravie LakshmananVulnerability / Network Security A command injection vulnerability in Array Networks…
-
As 2025 draws to a close, security professionals face a sobering realization: the traditional…
