fp-5c
-
Read moreiOS 26 overwrites shutdown.log, erasing Pegasus traces—learn about the impact on forensics and tips to protect against spyware threats.
-
Read moreCVE-2025-11001 and CVE-2025-11002 in 7-Zip allow code execution via malicious ZIPs—update to v25.00, disable symlinks, and use antivirus to avoid path traversal attacks.
-
Read moreHigh-severity CVE-2025-61884 (CVSS 7.5) in Oracle E-Business Suite's Configurator allows unauthenticated HTTP attacks to access sensitive data (versions 12.2.3-12.2.14). Follows Cl0p-linked CVE-2025-61882 exploits—apply updates, segment networks, and scan for vulnerabilities now.
-
Read moreDeepMind's CodeMender uses Gemini models to spot, patch, and rewrite vulnerable code, upstreaming 72 fixes to OSS projects. Google launches AI VRP for threat reports up to $30K and updates SAIF v2 to combat AI risks like prompt injections—empowering developers against cyber threats.
-
Read moreTA415 (APT41) uses Google Sheets, Calendar, and VS Code Remote Tunnels for stealthy C2 in spearphishing attacks targeting U.S. policy entities on trade/sanctions. From July-August 2025, WhirlCoil loader evades detection; evolve defenses with cloud anomaly monitoring.
-
Read moreA critical insecure deserialization vulnerability in N-able N-Central could allow attackers to execute arbitrary commands. Learn about the risks and recommended actions for organizations.
-
Read moreA critical vulnerability in GitHub Copilot (CVE-2025-53773) enables remote code execution through prompt injection attacks, compromising developers' machines. Learn how this flaw works and its implications.
-
Read moreLearn about the critical vulnerability in D-Link DNR-322L that allows code downloads without integrity checks. Discover recommended actions to secure your device.