IBM warns of critical API Connect bug enabling remote access
IBM warns of critical API Connect bug enabling remote access Pierluigi Paganini January 02, 2026 IBM disclosed a critical API Connect flaw (CVE-2025-13915, CVSS 9.8)…
IBM warns of critical API Connect bug enabling remote access Pierluigi Paganini January 02, 2026 IBM disclosed a critical API Connect flaw (CVE-2025-13915, CVSS 9.8)…
Cognizant Technology Solutions is facing multiple class-action lawsuits following a significant data breach at TriZetto Provider Solutions (TPS), its healthcare claims processing subsidiary. The lawsuits,…
This blog is part of a series where we highlight new or fast-evolving threats in consumer security. This one focuses on how AI is being…
Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages…
After a decade of disappearing from the cybersecurity landscape, the Careto threat group, also known as “The Mask,” has resurfaced with sophisticated new attack methods…
China has officially entered a new era of cyber regulation. As of January 1, 2026, the amended China cybersecurity law is now in effect, representing…
The cybersecurity community was alarmed in late December 2025 when MongoDB announced a serious vulnerability called “Mongobleed” (CVE-2025-14847). This high-severity flaw allows unauthenticated attackers to…
A newly disclosed use-after-free vulnerability in Apache NuttX RTOS could allow attackers to cause system crashes and unintended filesystem operations, prompting urgent security warnings for…
The legendary Careto threat actor, also known as “The Mask,” has resurfaced after a decade-long disappearance, employing sophisticated new attack methods that demonstrate the group’s…
The Apache Software Foundation has released a security advisory addressing a memory corruption vulnerability in the Apache NuttX Real-Time Operating System (RTOS). Tracked as CVE-2025-48769, this…
AI-generated code is already running inside devices that control power grids, medical equipment, vehicles, and industrial plants. AI moves from experiment to production AI tools…
Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This article outlines the pressures, gaps,…