CVE Alert: CVE-2025-1158
Vulnerability Summary: CVE-2025-1158 A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an...
Vulnerability Summary: CVE-2025-1158 A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an...
Vulnerability Summary: CVE-2025-25193 Netty, an asynchronous, event-driven network application framework, has a vulnerability in versions up to and including 4.1.118.Final....
Vulnerability Summary: CVE-2025-24970 Netty, an asynchronous, event-driven network application framework, has a vulnerability starting in version 4.1.91.Final and prior to...
Vulnerability Summary: CVE-2025-1162 A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. This affects an unknown...
Vulnerability Summary: CVE-2025-1160 A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected...
Vulnerability Summary: CVE-2025-25194 Lemmy, a link aggregator and forum for the fediverse, is vulnerable to server-side request forgery via a...
Cybercriminals are increasingly utilizing graphics files, particularly SVGs, to enhance their phishing attacks and bypass security measures. According to recent...
Researchers at Reversing Labs have unveiled two malicious AI models hosted on Hugging Face, highlighting a critical security concern related...
In 2024, GDPR enforcement actions in the UK predominantly targeted public sector organizations, revealing critical compliance issues. An analysis by...
In 2024, over 58% of large UK financial firms faced third-party supply chain attacks, highlighting serious issues in risk management...
Financial services must prepare for the looming quantum threat to enhance security and protect sensitive data as outlined by Europol....
The UK military is accelerating its recruitment efforts for specialist cybersecurity roles, offering competitive salaries to attract top talent in...
The UK government's recent demand for Apple's end-to-end encrypted data has left privacy advocates and security experts deeply concerned about...
An Indiana man has received a 20-year prison sentence for orchestrating a $37 million cryptocurrency theft scheme from his mother’s...
The BadIIS malware is a dangerous new threat targeting IIS servers, manipulating SEO to redirect users to illicit sites. A...
In November 2024, Memorial Hospital and Manor in Bainbridge, Georgia, reported a serious data breach affecting 120,000 individuals due to...
HIBP In July 2022, the Adopt Me Trading Values website for assessing the value of pet trades within the "Adopt...
HIBP In January 2019, the Indonesian college and career platform Youthmanual suffered a data breach that exposed 1.1M records of...
Microsoft Releases January 2025 Security Updates Microsoft released security updates to address vulnerabilities in multiple Microsoft products. A cyber threat...
Fortinet Releases Security Updates for Multiple Products Fortinet released security updates to address vulnerabilities in multiple Fortinet products. A cyber...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
Ivanti Releases Security Updates for Multiple Products Ivanti released security updates to address vulnerabilities in Ivanti Avalanche, Ivanti Application Control...
CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators Today,...
CISA Releases Microsoft Expanded Cloud Logs Implementation Playbook Today, CISA released the Microsoft Expanded Cloud Logs Implementation Playbook to help...