Russia has used one of the flaws, security experts said, while North Korea has used the other.
Related Articles
All CyberSecurityDive →Hackers abuse malicious version of Salesforce tool for data theft, extortion
A financially motivated hacker group has been targeting Salesforce instances for months in a campaign that uses voice phishing to engage in data theft and…
GOP lawmakers urge ban of networking vendor TP-Link, citing ties to China
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Congressional Republicans called on the…
Critical vulnerability found in n8n workflow automation platform
Security researchers warn that tens of thousands of systems may be exposed to a critical vulnerability in n8n, a widely used open-source workflow automation platform. …
Nearly 3K Ivanti Connect Secure instances vulnerable to critical flaw
Dive Brief: Approximately 2,850 IP addresses are vulnerable to CVE-2025-22467, a critical stack buffer-overflow vulnerability that affects Ivanti Connect Secure VPNs, according to a post…
SAP NetWeaver exploitation enters second wave of threat activity
A second wave of cyberattacks is targeting a critical vulnerability in SAP NetWeaver Visual Composer, according to researchers. Following the initial round of threat activity…
Many ‘material’ cybersecurity breaches go unreported: VikingCloud
Dive Brief: Nearly half (48%) of cybersecurity leaders didn’t report a “material” cybersecurity incident to their executive leadership or board of directors in the past…

