Vulnerabilities

Rowhammer Attack Demonstrated Against DDR5

Rowhammer Attack Demonstrated Against DDR5 2025-09-16 at 14:41 By Ionut Arghire Researchers devise Phoenix, a new Rowhammer attack that achieves root on DDR5 systems in less than two minutes. The post Rowhammer Attack Demonstrated Against DDR5 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Rowhammer Attack Demonstrated Against DDR5 Read More »

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities 2025-09-16 at 11:54 By Ionut Arghire Apple has announced major mobile and desktop platform releases and addressed an exploited bug in older platforms. The post Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities appeared first

React to this headline:

Loading spinner

Apple Rolls Out iOS 26, macOS Tahoe 26 With Patches for Over 50 Vulnerabilities Read More »

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm 2025-09-12 at 11:47 By Eduard Kovacs KioSoft was notified about a serious NFC card vulnerability in 2023 and only recently claimed to have released a patch. The post Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm appeared

React to this headline:

Loading spinner

Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Read More »

Cisco Patches High-Severity IOS XR Vulnerabilities

Cisco Patches High-Severity IOS XR Vulnerabilities 2025-09-11 at 17:37 By Ionut Arghire High-severity flaws in IOS XR could lead to ISO image verification bypass and denial-of-service conditions. The post Cisco Patches High-Severity IOS XR Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Cisco Patches High-Severity IOS XR Vulnerabilities Read More »

Critical Chrome Vulnerability Earns Researcher $43,000

Critical Chrome Vulnerability Earns Researcher $43,000 2025-09-11 at 16:35 By Ionut Arghire Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Critical Chrome Vulnerability Earns Researcher $43,000 Read More »

Not All Cyberattacks Begin with a Phishing Attack, Hack or Exploited Vulnerability

Not All Cyberattacks Begin with a Phishing Attack, Hack or Exploited Vulnerability 2025-09-10 at 21:44 By The strongest cybersecurity strategy includes robust physical security, since not all cyberattacks begin with a hack. Physical security is a crucial yet often overlooked part of any organization’s defense-in-depth approach. Improve your physical security and cybersecurity posture with a

React to this headline:

Loading spinner

Not All Cyberattacks Begin with a Phishing Attack, Hack or Exploited Vulnerability Read More »

Fortinet, Ivanti, Nvidia Release Security Updates

Fortinet, Ivanti, Nvidia Release Security Updates 2025-09-10 at 13:52 By Ionut Arghire High-severity vulnerabilities could lead to remote code execution, privilege escalation, information disclosure, and configuration tampering. The post Fortinet, Ivanti, Nvidia Release Security Updates appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Fortinet, Ivanti, Nvidia Release Security Updates Read More »

Microsoft Patches 86 Vulnerabilities

Microsoft Patches 86 Vulnerabilities 2025-09-09 at 21:57 By Eduard Kovacs Microsoft has released patches for dozens of flaws in Windows and other products, including ones with ‘exploitation more likely’ rating. The post Microsoft Patches 86 Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Microsoft Patches 86 Vulnerabilities Read More »

Adobe Patches Critical ColdFusion and Commerce Vulnerabilities

Adobe Patches Critical ColdFusion and Commerce Vulnerabilities 2025-09-09 at 21:21 By Eduard Kovacs Adobe has patched nearly two dozen vulnerabilities across nine of its products with its September 2025 Patch Tuesday updates. The post Adobe Patches Critical ColdFusion and Commerce Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Adobe Patches Critical ColdFusion and Commerce Vulnerabilities Read More »

The Cost of Inaction: Securing the Energy Grid Before It’s Too Late

The Cost of Inaction: Securing the Energy Grid Before It’s Too Late 2025-09-09 at 21:13 By Kory Daniels Critical infrastructure is under attack. Cyber threats to the energy sector have surged by 80% in one year. The average data breach in the energy sector now costs companies over $5 million, significantly more than the cross-industry

React to this headline:

Loading spinner

The Cost of Inaction: Securing the Energy Grid Before It’s Too Late Read More »

SAP Patches Critical NetWeaver Vulnerabilities

SAP Patches Critical NetWeaver Vulnerabilities 2025-09-09 at 17:07 By Ionut Arghire The critical-severity NetWeaver flaws could be exploited for remote code execution and privilege escalation. The post SAP Patches Critical NetWeaver Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

SAP Patches Critical NetWeaver Vulnerabilities Read More »

Recent SAP S/4HANA Vulnerability Exploited in Attacks

Recent SAP S/4HANA Vulnerability Exploited in Attacks 2025-09-05 at 11:09 By Eduard Kovacs A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in the wild. The post Recent SAP S/4HANA Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Recent SAP S/4HANA Vulnerability Exploited in Attacks Read More »

Hackers Exploit Sitecore Zero-Day for Malware Delivery

Hackers Exploit Sitecore Zero-Day for Malware Delivery 2025-09-04 at 12:02 By Ionut Arghire Google has observed ViewState deserialization attacks leveraging a sample machine key exposed in older deployment guides. The post Hackers Exploit Sitecore Zero-Day for Malware Delivery appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Hackers Exploit Sitecore Zero-Day for Malware Delivery Read More »

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack 2025-09-03 at 22:15 By Ionut Arghire Flaw allows attackers to reset and hijack TP-Link TL-WA855RE devices; CISA urges users to retire discontinued extenders. The post US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack Read More »

Google Patches High-Severity Chrome Vulnerability in Latest Update

Google Patches High-Severity Chrome Vulnerability in Latest Update 2025-09-03 at 17:40 By Ionut Arghire Chrome’s latest release addresses a high-severity use-after-free vulnerability in the V8 JavaScript engine that could be exploited for remote code execution. The post Google Patches High-Severity Chrome Vulnerability in Latest Update appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Google Patches High-Severity Chrome Vulnerability in Latest Update Read More »

Securing Healthcare’s Vulnerable Supply Chain

Securing Healthcare’s Vulnerable Supply Chain 2025-09-02 at 21:49 By Healthcare supply chains are increasingly vulnerable to cyber threats through third-party vendors, cloud services, and connected medical devices. Ransomware in healthcare can shut down critical systems, delay treatment, and endanger patient safety. Stronger cybersecurity standards, vendor risk management, and cross-border threat intelligence are vital to securing

React to this headline:

Loading spinner

Securing Healthcare’s Vulnerable Supply Chain Read More »

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers 2025-09-02 at 21:18 By Ionut Arghire Tracked as CVE-2025-57819 (CVSS score of 10/10), the bug is described as an insufficient sanitization of user-supplied data. The post Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers Read More »

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users 2025-09-02 at 14:48 By Ionut Arghire The vulnerability (CVE-2025-55177) was exploited along an iOS/macOS zero-day in suspected spyware attacks. The post WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

WhatsApp Zero-Day Exploited in Attacks Targeting Apple Users Read More »

Unraveling Phishing Campaigns Flagged by Trustwave’s URL Scanner

Unraveling Phishing Campaigns Flagged by Trustwave’s URL Scanner 2025-08-28 at 19:03 By Karla Agregado In recent months, Trustwave SpiderLabs, A LevelBlue Company, saw a significant increase in phishing URLs containing familiar patterns, similar phishing templates, and a resurgence in the use of email marketing platforms. The use of URL redirectors, along with the abuse of

React to this headline:

Loading spinner

Unraveling Phishing Campaigns Flagged by Trustwave’s URL Scanner Read More »

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack 2025-08-28 at 13:55 By Ionut Arghire With more than 4 million weekly downloads, the Nx build platform became the first known supply chain breach where hackers weaponized AI assistants for data theft. The post Hackers Target Popular Nx Build System in First AI-Weaponized

React to this headline:

Loading spinner

Hackers Target Popular Nx Build System in First AI-Weaponized Supply Chain Attack Read More »

Scroll to Top