Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges
14
Nov
2025

Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers…

Hackers Movie Guide Review: Third Eye Spies
14
Nov
2025

Cybersecurity Lessons For Leaders: Designing Resilience at Scale

“As an AI entrepreneur and cybersecurity leader, I’ve watched compliance frameworks struggle to keep pace with modern threats,” writes Nishant…

Critical FortiWeb flaw under attack, allowing complete compromise
14
Nov
2025

Critical FortiWeb flaw under attack, allowing complete compromise

Critical FortiWeb flaw under attack, allowing complete compromise Pierluigi Paganini November 14, 2025 A Fortinet FortiWeb auth-bypass flaw is being…

The researcher’s desk: CVE-2025-59287 - Blog Detectify
14
Nov
2025

The researcher’s desk: CVE-2025-59287 – Blog Detectify

Welcome to The researcher’s desk  – a content series where the Detectify security research team conducts a technical autopsy on…

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
14
Nov
2025

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers

Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers…

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects
14
Nov
2025

Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors abuse legitimate JSON storage services to deliver malware to software…

A piece of the code inside the vbs file with the last line commented out.
14
Nov
2025

Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials

Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT)…

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
14
Nov
2025

A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn

A suspected (but currently unidentified) zero-day vulnerability in Fortinet FortiWeb is being exploited by unauthenticated attackers to create new admin…

Apple
14
Nov
2025

Your passport, now on your iPhone. Helpful or risky?

Apple has launched Digital ID, a way for users in the US to create and present a government-issued ID in Apple…

Android
14
Nov
2025

Google backpedals on new Android developer registration rules

Google is backpedaling on its decision to introduce new identity verification rules for all developers, stating that it will also…

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years
14
Nov
2025

Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years

Security researcher Paul McCarty uncovered a significant coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, as it has…

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
14
Nov
2025

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques

A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more…