Category: CyberSecurityNews

Canada's House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability
14
Aug
2025

Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability

A significant cyberattack hit the Canadian House of Commons on August 9, 2025, when threat actors exploited a recently disclosed…

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
14
Aug
2025

Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack

A critical security vulnerability in Apache Tomcat’s HTTP/2 implementation has been discovered, enabling attackers to launch devastating denial-of-service (DoS) attacks…

Adobe’s August 2025 Patch Tuesday
14
Aug
2025

Adobe’s August 2025 Patch Tuesday

Adobe has released a comprehensive security update addressing 60 critical vulnerabilities across 13 of its flagship products as part of…

Splunk Release Guide for Defenders to Detect Suspicious Activity Before ESXi Ransomware Attack
14
Aug
2025

Splunk Release Guide for Defenders to Detect Suspicious Activity Before ESXi Ransomware Attack

A detailed security guide released by Splunk to help cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure before…

Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
14
Aug
2025

Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks

A sophisticated new threat vector has emerged that could undermine one of the most trusted authentication methods in cybersecurity. FIDO-based…

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code
14
Aug
2025

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code

Critical vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, allow unauthenticated remote attackers to execute malicious code on…

"AI-Induced Destruction” - Helpful Tools Become Accidental Weapons
14
Aug
2025

“AI-Induced Destruction” – Helpful Tools Become Accidental Weapons

Artificial intelligence coding assistants, designed to boost developer productivity, are inadvertently causing massive system destruction.  Researchers report a significant spike…

ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns
14
Aug
2025

ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns

The notorious ShinyHunters cybercriminal group has emerged from a year-long hiatus with a sophisticated new wave of attacks targeting Salesforce…

Critical Wordpress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks
14
Aug
2025

Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks

A critical security vulnerability has been discovered in the popular “Database for Contact Form 7, WPforms, Elementor forms” WordPress plugin,…

CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks
14
Aug
2025

CISA Warns of N-able N-Central Deserialization and Injection Vulnerability Exploited in Attacks

CISA has issued urgent warnings regarding two critical security vulnerabilities in N-able N-Central remote monitoring and management (RMM) software that…

14
Aug
2025

“AI-Induced Destruction” – Helpful Tools Become Accidental Weapons

Artificial intelligence coding assistants, designed to boost developer productivity, are inadvertently causing massive system destruction.  Researchers report a significant spike…

What Is Out-of-Bounds Read and Write Vulnerability?
14
Aug
2025

What Is Out-of-Bounds Read and Write Vulnerability?

Out-of-bounds read and write vulnerabilities represent critical security vulnerabilities that occur when software accesses memory locations beyond the allocated boundaries…