TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections
18
Sep
2025

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2025-9961, has been discovered in TP-Link routers. Security research firm…

Absolute Security Rehydrate restores compromised endpoints
18
Sep
2025

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational…

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions
18
Sep
2025

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

Sep 18, 2025Ravie LakshmananVulnerability / Browser Security Google on Wednesday released security updates for the Chrome web browser to address…

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network
18
Sep
2025

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network

The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS)…

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT
18
Sep
2025

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT

On August 4, 2025, Zscaler ThreatLabz uncovered two malicious Python packages—sisaws and secmeasure—that deliver SilentSync, a Python-based remote access trojan…

Behind the scenes of cURL with its founder: Releases, updates, and security
18
Sep
2025

Behind the scenes of cURL with its founder: Releases, updates, and security

In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure…

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links
18
Sep
2025

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links

Cybersecurity researchers at Varonis Threat Labs have uncovered a persistent vulnerability that has remained unaddressed for over a decade, allowing…

Product showcase: Exaforce - The full lifecycle AI SOC platform
18
Sep
2025

Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave…

Google Chrome 0-Day Under Active Attack – Update Immediately
18
Sep
2025

Google Chrome 0-Day Under Active Attack – Update Immediately

Google has released an urgent security update for Chrome browser users worldwide, addressing four critical vulnerabilities, including one zero-day exploit…

Shadow AI is breaking corporate security from within
18
Sep
2025

Shadow AI is breaking corporate security from within

Cybersecurity leaders know the attack surface has been growing for years, but the latest State of Information Security Report 2025…

Staggering cost of outages to businesses
18
Sep
2025

Staggering cost of outages to businesses

New Relic has released its 2025 Observability Forecast, surveying over 1,700 IT and engineering leaders and team members across 23…

Global hiring risks: What you need to know about identity fraud and screening trends
18
Sep
2025

Global hiring risks: What you need to know about identity fraud and screening trends

Hiring new employees has always carried some risk, but that risk is growing in new ways, and identity fraud is…