VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution
30
Sep
2025

VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution

A zero-day local privilege escalation vulnerability in VMware Tools and VMware Aria Operations is being actively exploited in the wild….

Veeam RCE Exploit Allegedly Listed for Sale on Dark Web
30
Sep
2025

Veeam RCE Exploit Allegedly Listed for Sale on Dark Web

A new dark web marketplace listing has sparked alarm in the cybersecurity community after a seller using the handle “SebastianPereiro”…

Your budget Android phone might be spying on you
30
Sep
2025

Your budget Android phone might be spying on you

Researchers have found that many low-cost Android devices come with pre-installed apps that have high-level access to the system. Unlike…

Western Digital My Cloud NAS Devices Vulnerability Let Attackers Execute Malicious Code
30
Sep
2025

Western Digital My Cloud NAS Devices Vulnerability Let Attackers Execute Malicious Code

Western Digital has released security updates for a critical vulnerability affecting multiple My Cloud network-attached storage (NAS) devices. The flaw,…

VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames
30
Sep
2025

VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames

Broadcom released VMSA-2025-0016 to address three key vulnerabilities affecting VMware vCenter Server and NSX products. The vulnerabilities include an SMTP…

The hidden risks inside open-source code
30
Sep
2025

The hidden risks inside open-source code

Open-source software is everywhere. It runs the browsers we use, the apps we rely on, and the infrastructure that keeps…

Critical Sudo Flaw
30
Sep
2025

CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

Sep 30, 2025Ravie LakshmananVulnerability / Linux The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security…

Industry groups worry about cyber info sharing
30
Sep
2025

Industry groups worry about cyber info sharing

The US federal law that facilitates a significant portion of information sharing between the federal government and private sector is…

Apple Font Parser Vulnerability Enables Malicious Fonts to Crash or Corrupt Process Memory
30
Sep
2025

Apple Font Parser Vulnerability Enables Malicious Fonts to Crash or Corrupt Process Memory

Apple has rolled out security updates across its operating systems to address a vulnerability in the Font Parser component that…

New Harrods Data Breach Leaks Personal Information of 430,000 Customers
30
Sep
2025

New Harrods Data Breach Leaks Personal Information of 430,000 Customers

Luxury department store Harrods has become the latest victim of a significant cybersecurity incident after hackers successfully accessed personal data belonging to 430,000…

Cyber risk quantification helps CISOs secure executive support
30
Sep
2025

Cyber risk quantification helps CISOs secure executive support

In this Help Net Security interview, Vivien Bilquez, Global Head of Cyber Resilience at Zurich Resilience Solutions, discusses how organizations…

Asahi Group production impacted by cyberattack
30
Sep
2025

Asahi Group production impacted by cyberattack

Japanese beer and beverage giant Asahi Group Holdings has not been able to resume production at domestic factories a day…