| Nov 5, 2025 Critical Vulnerability in Dataphone A920: CVE-2025-61235 Exposed CVE-2025-61235 is a critical vulnerability affecting the Dataphone A920 firmware arising from improper validation of network packet input.
| Oct 28, 2025 Critical Remote Code Execution in Oracle Marketing (E-Business Suite) CVE-2025-53072 is a critical unauthenticated RCE vulnerability affecting the Marketing Admin module of Oracle Marketing, part of Oracle E-Business Suite.
| Oct 14, 2025 Attackers Exploit Velociraptor in Sophisticated Ransomware Campaigns Cisco Talos has confirmed that ransomware operators are weaponizing Velociraptor, an open-source DFIR tool, to aid in the deployment of ransomware attacks.
| Oct 7, 2025 Google Salesforce Breach: UNC6040's Vishing and OAuth Attack Analysis In June 2025, Google’s internal Salesforce instance, used for managing SMB data, was breached in a cyberattack orchestrated by the UNC6040 threat group.
| Sep 30, 2025 AI vs. AI: Microsoft's Battle Against AI-Obfuscated Phishing Campaigns Microsoft Threat Intelligence recently shut down a credential phishing campaign employing AI to obfuscate attack payloads and evade conventional defenses.
| Sep 22, 2025 Google Urgently Patches Sixth Chrome Zero-Day Vulnerability of 2025 Google has urgently released a security update to address a critical zero-day vulnerability (CVE-2025-10585) in its Chrome web browser.
| Sep 15, 2025 Hackers Hijack NPM Packages in Major Supply Chain Attack A major software supply chain attack has shaken the open-source JavaScript ecosystem, as attackers hijacked several high-profile npm packages.
| Sep 4, 2025 Critical Memory Overflow in Citrix NetScaler ADC & Gateway CVE-2025-7775 is a critical memory overflow vulnerability in Citrix NetScaler ADC and NetScaler Gateway that enables unauthenticated RCE and/or DoS.
| Aug 18, 2025 Unauthenticated RCE Vulnerability in Microsoft SharePoint Server CVE-2025-53770 is a critical unauthenticated remote code execution (RCE) vulnerability affecting on-premises Microsoft SharePoint Server deployments.
| May 27, 2025 WordPress Review Plugin Vulnerability: CVE-2025-2158 LFI Risk Alert CVE-2025-2158 is a high-severity LFI vulnerability affecting the WordPress Review Plugin: The Ultimate Solution for Building a Review Website.