Princeton University confirmed on November 15 that an Advancement database containing sensitive personal information about alums, donors, faculty members, students,…
Malicious hackers have been attacking the development environment of an open-source AI framework, twisting its functions into a global cryptojacking…
Thunderbird 145 has been released with full native support for Microsoft Exchange email via the Exchange Web Services (EWS) protocol….
Security researchers at HiddenLayer have uncovered a critical vulnerability that exposes fundamental weaknesses in the guardrails protecting today’s most powerful…
Optus has copped an $826,000 fine after scammers exploited a vulnerability in a third-party identity verification system it used, allowing…
Pennsylvania Office of the Attorney General (OAG) confirms data breach after August attack Pierluigi Paganini November 18, 2025 The Pennsylvania…
Letting a cyber threat data sharing law expire could waste government efforts to find vulnerabilities, since companies would no longer…
Pajemploi, the French social security service for parents and home-based childcare providers, has suffered a data breach that may have…
Austin, TX/USA, November 18th, 2025, CyberNewsWire Forecast report highlights surge in identity-based threats, evolving threat actor tactics, and increased risk…
Fortinet may have silently patched an exploited zero-day vulnerability more than two weeks before officially disclosing the vulnerability. CVE-2025-64446 in…
-European Union regulators have designated 19 technology companies, including Amazon Web Services, Google Cloud and Microsoft, as critical third-party computing…
A global campaign dubbed ShadowRay 2.0 hijacks exposed Ray Clusters by exploiting an old code execution flaw to turn them into a…