Vulnerabilities

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone 2025-06-18 at 22:47 By The Israel-Iran conflict is barely a week old, but the security repercussions for the two combatants and the wider global community can already be seen as the cyberwarfare portion of the conflict is already spilling over […]

React to this headline:

Loading spinner

The Digital Front Line: Israel and Iran Turn the Internet into a Covert Combat Zone Read More »

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection 2025-06-18 at 20:11 By Ionut Arghire Misconfigured permissions in Google’s Gerrit code collaboration platform could have led to the compromise of ChromiumOS and other Google projects. The post Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection Read More »

Critical Vulnerability Patched in Citrix NetScaler

Critical Vulnerability Patched in Citrix NetScaler 2025-06-18 at 16:20 By Ionut Arghire Citrix has released patches for critical- and high-severity vulnerabilities in NetScaler and Secure Access Client and Workspace for Windows. The post Critical Vulnerability Patched in Citrix NetScaler appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Critical Vulnerability Patched in Citrix NetScaler Read More »

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation 2025-06-18 at 15:33 By Eduard Kovacs Qualys has disclosed two Linux vulnerabilities that can be chained for full root access, and CISA added a flaw to its KEV catalog. The post Linux Security: New Flaws Allow Root Access, CISA Warns of Old

React to this headline:

Loading spinner

Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Read More »

Chrome 137 Update Patches High-Severity Vulnerabilities

Chrome 137 Update Patches High-Severity Vulnerabilities 2025-06-18 at 12:52 By Ionut Arghire Google has released a Chrome 137 update to resolve two memory bugs in the browser’s V8 and Profiler components. The post Chrome 137 Update Patches High-Severity Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Chrome 137 Update Patches High-Severity Vulnerabilities Read More »

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products 2025-06-18 at 11:45 By Ionut Arghire Veeam and BeyondTrust have resolved several vulnerabilities that could be exploited for remote code execution. The post Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Read More »

Trustwave on High Alert: How the Israel-Iran Battle Could Impact Your Organization

Trustwave on High Alert: How the Israel-Iran Battle Could Impact Your Organization 2025-06-17 at 19:21 By The combat operations initiated on June 12 between Israel and Iran, as with the ongoing Ukraine-Russia conflict, once again place organizations on alert for any cyber operations either directly or adjacently related to the conflict. This article is an

React to this headline:

Loading spinner

Trustwave on High Alert: How the Israel-Iran Battle Could Impact Your Organization Read More »

Zyxel Firewall Vulnerability Again in Attacker Crosshairs

Zyxel Firewall Vulnerability Again in Attacker Crosshairs 2025-06-17 at 16:33 By Ionut Arghire GreyNoise warns of a spike in exploitation attempts targeting a two-year-old vulnerability in Zyxel firewalls. The post Zyxel Firewall Vulnerability Again in Attacker Crosshairs appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Zyxel Firewall Vulnerability Again in Attacker Crosshairs Read More »

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers 2025-06-17 at 14:01 By Ionut Arghire CISA warns that a vulnerability impacting multiple discontinued TP-Link router models is exploited in the wild. The post Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original

React to this headline:

Loading spinner

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers Read More »

Asus Armoury Crate Vulnerability Leads to Full System Compromise

Asus Armoury Crate Vulnerability Leads to Full System Compromise 2025-06-17 at 12:49 By Ionut Arghire A high-severity authorization bypass vulnerability in Asus Armoury Crate provides attackers with low-level system privileges. The post Asus Armoury Crate Vulnerability Leads to Full System Compromise appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Asus Armoury Crate Vulnerability Leads to Full System Compromise Read More »

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking 2025-06-13 at 11:33 By Eduard Kovacs Mitel has announced patches for a MiCollab path traversal vulnerability that can be exploited remotely without authentication. The post Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Read More »

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption PolicyServer

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption PolicyServer 2025-06-13 at 11:03 By Ionut Arghire Trend Micro patches critical-severity Apex Central and Endpoint Encryption PolicyServer flaws leading to remote code execution. The post Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption PolicyServer appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption PolicyServer Read More »

Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Palo Alto Networks Patches Privilege Escalation Vulnerabilities 2025-06-12 at 11:35 By Ionut Arghire Palo Alto Networks has released patches for seven vulnerabilities and incorporated the latest Chrome fixes in its products. The post Palo Alto Networks Patches Privilege Escalation Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React

React to this headline:

Loading spinner

Palo Alto Networks Patches Privilege Escalation Vulnerabilities Read More »

Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape

Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape 2025-06-11 at 16:47 By SecurityWeek News Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business. The post Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Read More »

Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints

Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints 2025-06-11 at 16:01 By Ed Williams Many of the largest hospitality organizations operate on a global scale. While guest demands remain relatively constant across regions, cyberthreats and defensive capabilities can vary significantly. This article is an excerpt from Trustwave Blog View Original Source React to

React to this headline:

Loading spinner

Cybersecurity in UK Hospitality: Navigating Compliance, Threats, and Resource Constraints Read More »

Fortinet, Ivanti Patch High-Severity Vulnerabilities

Fortinet, Ivanti Patch High-Severity Vulnerabilities 2025-06-11 at 15:48 By Ionut Arghire Patches released by Fortinet and Ivanti resolve over a dozen vulnerabilities, including high-severity flaws leading to code execution, credential leaks. The post Fortinet, Ivanti Patch High-Severity Vulnerabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Fortinet, Ivanti Patch High-Severity Vulnerabilities Read More »

Chrome, Firefox Updates Resolve High-Severity Memory Bugs

Chrome, Firefox Updates Resolve High-Severity Memory Bugs 2025-06-11 at 13:33 By Ionut Arghire Google and Mozilla have released patches for a combined total of four high-severity memory bugs in Chrome and Firefox. The post Chrome, Firefox Updates Resolve High-Severity Memory Bugs appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Chrome, Firefox Updates Resolve High-Severity Memory Bugs Read More »

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce 2025-06-10 at 22:05 By Ryan Naraine Patch Tuesday: Adobe documents hundreds of bugs across multiple products and warns of code execution, feature bypass risks. The post Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Code Execution Flaws Haunt Adobe Acrobat Reader, Adobe Commerce Read More »

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ 2025-06-10 at 21:20 By Ryan Naraine Redmond warns that external control of a file name or path in WebDAV “allows an unauthorized attacker to execute code over a network.” The post Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ appeared first on SecurityWeek.

React to this headline:

Loading spinner

Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’ Read More »

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud 2025-06-10 at 15:03 By Kevin Townsend Security researchers uncover critical flaws and widespread misconfigurations in Salesforce’s industry-specific CRM solutions. The post Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud Read More »

Scroll to Top