Microsoft fixed the vulnerability pair—CVE-2025-49706 and CVE-2025-49704—two weeks ago as part of the company’s monthly update release. As the world […]
Tag: vulnerabilities
Google finds custom backdoor being installed on SonicWall network devices
Researchers from the Google Threat Intelligence Group said that hackers are compromising SonicWall Secure Mobile Access (SMA) appliances, which sit […]
Security teams struggle to prioritize and patch vulnerabilities
According to a new report 39 percent of security professionals say they struggle to prioritize risk remediation and patch deployment, […]
European manufacturers face critical vulnerabilities
The manufacturing industry is the most targeted industry for cyberattacks and this has has now been the case for four […]
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
A critical vulnerability allowing hackers to bypass multifactor authentication in network management devices made by Citrix has been actively exploited […]
Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
Skip to content A skeleton key for hackers The publicly available exploits provide a near-universal way to bypass key protections. […]
Critical vulnerabilities found across all cloud providers
A new report from CyCognito highlights critical security vulnerabilities across cloud-hosted material, revealing that one in three easily exploitable vulnerabilities […]
Open source project curl is sick of users submitting “AI slop” vulnerabilities
Ars has reached out to HackerOne for comment and will update this post if we get a response. “More tools […]
Microsoft vulnerabilities hit a record high in 2024
The latest annual Microsoft Vulnerabilities Report from BeyondTrust, reveals a record-breaking number of reported vulnerabilities last year. Total vulnerabilities reached […]
Organizations fix under half of exploitable vulnerabilities
The latest State of Pentesting report from Cobalt reveals that organizations are fixing less than half of all exploitable vulnerabilities, […]