vulnerability
-
Read moreTwo critical zero-day vulnerabilities in Trend Micro Apex One (on-prem) devices, CVE-2025-54948 and CVE-2025-54987, are being exploited in the wild. Learn about their impact and mitigation strategies.
-
Read moreLearn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.
-
Read moreDiscover critical pre-auth vulnerabilities in Adobe Experience Manager Forms identified by the Searchlight Cyber Research Team. Learn about the risks and recommended actions to secure your deployment.
-
Read moreDiscover the critical vulnerability in Cursor IDE, known as 'CurXecute,' that enables remote code execution without user interaction. Learn about the risks and necessary updates.
-
Read moreA recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Read moreSonicWall has identified critical vulnerabilities in its SMA 100 series SSL-VPN appliances, allowing remote code execution. Learn about the risks and recommended actions to secure your systems.
-
Read moreDiscover the CSRF vulnerability in PaperCut NG/MF that could allow attackers to modify security settings or execute arbitrary code. Learn about recommended actions to mitigate risks.
-
Read moreLearn about the injection vulnerability in Cisco Identity Services Engine (ISE) that could allow remote code execution. Discover recommended actions to mitigate risks and protect your network.
-
Read moreCrushFTP warns users of active exploitation of CVE-2025-54309, a vulnerability allowing remote admin access via HTTPS on unpatched servers. Learn about affected versions and recommended actions.
-
Read moreMicrosoft has disclosed a critical zero-day vulnerability in SharePoint Server (CVE-2025-53770) with a CVSS score of 9.8. Learn about the active exploitation, impact on enterprises, and emergency patches available.