ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted…
Researchers at Ontinue’s Cyber Defense Center have uncovered a significant threat as attackers exploit Nezha, a legitimate open-source server monitoring…
Cloud environments are moving faster than the systems meant to protect them. A new Palo Alto Networks study shows security…
Dec 23, 2025Ravie LakshmananVulnerability / Workflow Automation A critical security vulnerability has been disclosed in the n8n workflow automation platform…
A critical vulnerability affecting Digiever DS-2105 Pro network video recorders was added to the Known Exploited Vulnerabilities (KEV) catalog on…
Payment card breaches continue to surface across industries, even after years of investment in security standards. A new study links…
Dec 23, 2025Ravie LakshmananCybersecurity / Surveillance The U.S. Federal Communications Commission (FCC) on Monday announced a ban on all drones…
Chinese short-video platform Kuaishou Technology saw its shares fall sharply after the company confirmed a cyberattack that briefly disrupted its…
The shadow library known as Anna’s Archive has executed a massive scrape of Spotify, releasing a torrent collection containing approximately…
DNSSEC is meant to stop attackers from tampering with DNS answers. It signs records so resolvers can verify that data…
The La Poste cyberattack disrupted France’s national postal service just days before Christmas, temporarily knocking key websites and mobile applications…
Software teams have spent the past year sorting through a rising volume of pull requests generated with help from AI…