vulnerability
-
Read moreA critical vulnerability in Fortinet FortiSIEM (CVE-2025-25256) allows unauthenticated attackers to execute arbitrary commands remotely. Learn about the risks and mitigation strategies.
-
Read moreMicrosoft has revealed a critical RCE vulnerability in Teams (CVE-2025-53783) that could let attackers read, write, and delete messages. Learn about the risks and fixes.
-
Read moreResearchers unveil the 'Win-DoS Epidemic' at DEF CON 33, revealing new vulnerabilities in Windows that can turn servers and Domain Controllers into DDoS botnets. Learn more about the risks.
-
Read moreA serious flaw in a major automaker's dealer portal allows hackers to unlock and start vehicles remotely. Learn about the vulnerability and its implications.
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreLearn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Read moreA recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Read moreSonicWall has identified critical vulnerabilities in its SMA 100 series SSL-VPN appliances, allowing remote code execution. Learn about the risks and recommended actions to secure your systems.