Critical WatchGuard Vulnerability Lets Unauthenticated Attackers Run Arbitrary Code
18
Sep
2025

Critical WatchGuard Vulnerability Lets Unauthenticated Attackers Run Arbitrary Code

 WatchGuard released an advisory detailing a critical vulnerability in its Firebox line of network security appliances. Tracked as CVE-2025-9242, the…

18
Sep
2025

Catchpoint improves monitoring posture with AI capabilities

Catchpoint released two AI-powered capabilities designed to simplify digital resilience for critical applications: Catchpoint Root Cause Analysis (RCA) and Catchpoint…

Greenshot Vulnerability POC
18
Sep
2025

Greenshot Vulnerability Exposes Windows To Code Execution

A security vulnerability has been discovered in Greenshot, the widely used open-source screenshot tool for Windows. The Greenshot vulnerability exposes…

Insight Partners ransomware data breach
18
Sep
2025

Insight Partners Confirms Data Breach Result of Ransomware Attack

Venture capital firm Insight Partners has revealed that the data breach disclosed earlier this year was the result of a…

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections
18
Sep
2025

TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2025-9961, has been discovered in TP-Link routers. Security research firm…

18
Sep
2025

Absolute Security Rehydrate restores compromised endpoints

Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational…

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions
18
Sep
2025

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

Sep 18, 2025Ravie LakshmananVulnerability / Browser Security Google on Wednesday released security updates for the Chrome web browser to address…

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network
18
Sep
2025

Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network

The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS)…

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT
18
Sep
2025

Malicious Typosquatted PyPI Packages Spreading SilentSync RAT

On August 4, 2025, Zscaler ThreatLabz uncovered two malicious Python packages—sisaws and secmeasure—that deliver SilentSync, a Python-based remote access trojan…

18
Sep
2025

Behind the scenes of cURL with its founder: Releases, updates, and security

In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure…

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links
18
Sep
2025

Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links

Cybersecurity researchers at Varonis Threat Labs have uncovered a persistent vulnerability that has remained unaddressed for over a decade, allowing…

18
Sep
2025

Product showcase: Exaforce – The full lifecycle AI SOC platform

Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave…