The maker of Passwordstate, an enterprise-grade password manager for storing companies’ most privileged credentials, is urging them to promptly install […]
Category: vulnerabilities
Six newly identified Windows vulnerabilities put Microsoft users at serious risk
Six newly discovered Windows vulnerabilities, including one rated as critical, could crash systems, allow attackers to run malicious code, or […]
Attackers exploit old vulnerabilities as zero-day exploits surge
New analysis from Forescout of more than 23,000 vulnerabilities and 885 threat actors across 159 countries worldwide during the first […]
What to know about ToolShell, the SharePoint threat under mass exploitation
Microsoft fixed the vulnerability pair—CVE-2025-49706 and CVE-2025-49704—two weeks ago as part of the company’s monthly update release. As the world […]
Google finds custom backdoor being installed on SonicWall network devices
Researchers from the Google Threat Intelligence Group said that hackers are compromising SonicWall Secure Mobile Access (SMA) appliances, which sit […]
Security teams struggle to prioritize and patch vulnerabilities
According to a new report 39 percent of security professionals say they struggle to prioritize risk remediation and patch deployment, […]
European manufacturers face critical vulnerabilities
The manufacturing industry is the most targeted industry for cyberattacks and this has has now been the case for four […]
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
A critical vulnerability allowing hackers to bypass multifactor authentication in network management devices made by Citrix has been actively exploited […]
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Skip to content A skeleton key for hackers The publicly available exploits provide a near-universal way to bypass key protections. […]
Critical vulnerabilities found across all cloud providers
A new report from CyCognito highlights critical security vulnerabilities across cloud-hosted material, revealing that one in three easily exploitable vulnerabilities […]