eSecurity Planet content and product recommendations are editorially independent. We may make money when…
Active
-
-
Physical SecuritySecurity
Google researchers detect first operational use of LLMs in active malware campaigns
by adminby adminPROMPTFLUX, meanwhile, is a dropper that uses a decoy installer to hide its activity;…
-
Vulnerability
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
by adminby adminNov 05, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency…
-
Vulnerability
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
by adminby adminOct 31, 2025Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency…
-
Vulnerability
Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
by adminby adminOct 29, 2025Ravie LakshmananVulnerability / Malware Threat actors are actively exploiting multiple security flaws…
-
Vulnerability
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
by adminby adminOct 24, 2025Ravie LakshmananVulnerability / Network Security Microsoft on Thursday released out-of-band security updates…
-
-
Vulnerability
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
by adminby adminOct 16, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency…
-
Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active…
