Critical Zoom Vulnerability CVE-2025-49457 Poses Risks
A critical security vulnerability has recently been discovered in certain versions of Zoom Clients for Windows that could expose users to cybersecurity risks, including privilege…
A critical security vulnerability has recently been discovered in certain versions of Zoom Clients for Windows that could expose users to cybersecurity risks, including privilege…
Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on vulnerable systems. The flaws, tracked…
Trustwave SpiderLabs researchers have uncovered a sophisticated EncryptHub campaign that ingeniously abuses the Brave Support platform to deliver malicious payloads, leveraging the recently disclosed CVE-2025-26633…
The effectiveness of the European data protection framework depends on two essential pillars: robust individual rights and the institutional independence of the authority enforcing them.…
IBM’s 2025 Cost of a Data Breach Report offers one of the clearest and most comprehensive views yet of how AI adoption is shaping the…
OpenAI is building an agentic future with its upcoming Chromium-based browser and a new leak confirms GPT Agent integration. ChatGPT already comes with Agent mode,…
The second Trump administration has its first federal cybersecurity debacle to deal with. A breach of the United States federal judiciary’s electronic case filing system,…
Splunk has released a comprehensive defender’s guide aimed at helping cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure before they can cause widespread…
Two vulnerabilities (CVE-2025-8875, CVE-2025-8876) in N-central, a remote monitoring and management (RMM) solution by N-able that’s popular with managed service providers, are being exploited by…
Aug 14, 2025The Hacker NewsEndpoint Security / Application Security Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the…
The notorious ShinyHunters cybercriminal group has emerged from a year-long hiatus with a sophisticated new wave of attacks targeting Salesforce platforms across major organizations, including…
Android privilege escalation has been transformed by rooting frameworks such as KernelSU, APatch, and SKRoot, which use advanced kernel patching techniques to enable unauthorized code…