CISA Warns of Git Arbitrary File Write Vulnerability Exploited in Attacks
CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via misconfigured...
Read more →CISA has issued a high-severity warning for CVE-2025-48384, a link-following vulnerability in Git that enables arbitrary file writes via misconfigured...
Read more →Cloud Software Group has disclosed multiple high-severity vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)...
Read more →Microsoft has released a new VM Conversion extension for Windows Admin Center, designed to streamline the migration of VMware virtual...
Read more →Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However, their cloud-based...
Read more →Aembit, the workload identity and access management (IAM) company, today announced new capabilities for GitLab designed to reduce the security...
Read more →Hackers can weaponize hidden prompts revealed by downscaled images to trigger sensitive tool actions and achieve data exfiltration in Gemini CLI—and similar...
Read more →In August 2025, researchers at George Mason University published a groundbreaking study at the 34th USENIX Security Symposium, introducing OneFlip,...
Read more →The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,...
Read more →Google has disclosed a critical zero-day vulnerability in the V8 JavaScript engine used by Chrome, tracked as CVE-2025-5419. Before a...
Read more →Major French retail chain Auchan announced on August 21, 2025, that it suffered a significant cybersecurity incident resulting in the...
Read more →A comprehensive analysis of the top 10 social media platforms reveals that X (formerly Twitter) stands out as the most...
Read more →A malvertising campaign using sponsored results on Microsoft’s search platform delivered a weaponized PuTTY that established persistence, enabled hands-on keyboard...
Read more →