CVE Alert: CVE-2025-20138
Vulnerability Summary: CVE-2025-20138 A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to...
Vulnerability Summary: CVE-2025-20138 A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to...
Vulnerability Summary: CVE-2025-20115 A vulnerability in confederation implementation for the Border Gateway Protocol (BGP) in Cisco IOS XR Software could allow...
Ransomware Group: FOG VICTIM NAME: University Diagnostic Medical Imaging, PC (udminet) NOTE: No files or stolen information are by RedPacket...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution,...
Vulnerability Summary: CVE-2025-20177 A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker...
Vulnerability Summary: CVE-2025-20209 A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could...
Vulnerability Summary: CVE-2025-20146 A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000...
Vulnerability Summary: CVE-2025-20145 A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR...
Vulnerability Summary: CVE-2025-25711 An issue in dtp.ae tNexus Airport View v.2.8 allows a remote attacker to escalate privileges via the...
Vulnerability Summary: CVE-2025-25774 An issue was discovered in Open5GS v2.7.2. When a UE switches between two gNBs and sends a...
Vulnerability Summary: CVE-2024-34398 An issue was discovered in BMC Remedy Mid Tier 7.6.04. The web application allows stored HTML Injection...
Vulnerability Summary: CVE-2025-2002 CWE-532: Insertion of Sensitive Information into Log Files vulnerability exists that could cause the disclosure of FTP...
Vulnerability Summary: CVE-2025-25683 AlekSIS-Core is vulnerable to Incorrect Access Control. Unauthenticated users can access all PDF files. This affects AlekSIS-Core...
Vulnerability Summary: CVE-2025-27407 graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25,...
The UK cybersecurity sector has recently shown remarkable growth, with revenue increasing by 12% to surpass £13 billion, according to...
Microsoft's March Patch Tuesday brings renewed urgency for system administrators, mandating attention to over 50 vulnerabilities, including seven critical zero-days....
Chinese hackers have targeted Juniper routers by implanting backdoor malware, prompting organizations to upgrade their devices to maintain cybersecurity. According...
The rise of machine identities in cloud environments, now outnumbering human users, poses significant security risks. According to a recent...
Concerns have emerged regarding the e-voting system for the ISACA London Chapter's upcoming Extraordinary General Meeting (EGM), set for March...
iOS 18.3.2 and iPadOS 18.3.2 have been released by Apple to address a critical WebKit vulnerability that cybercriminals have been...
The Trump administration is implementing drastic changes at the Cybersecurity and Infrastructure Agency (CISA), affecting staff and funding for vital...
Ransomware Group: BABUK2 VICTIM NAME: Iraqi Council of Ministers NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: BABUK2 VICTIM NAME: Iraqi Ministry of Finance NOTE: No files or stolen information are by RedPacket Security. Any...
Ransomware Group: FOG VICTIM NAME: El Camino Real Academy (elcaminorealacademy) NOTE: No files or stolen information are by RedPacket Security....