Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition
05
Jul
2025

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition

Key Takeaways1. Next.js versions 15.1.0-15.1.8 have a cache poisoning bug causing DoS attacks through blank page delivery.2. Needs affected Next.js…

Gemini
05
Jul
2025

Google’s AI video maker Veo 3 is now available via $20 Gemini

Google says Veo 3, which is the company’s state-of-the-art video generator, is now shipping to everyone using the Gemini app…

ChatGPT
05
Jul
2025

ChatGPT Deep Research tests new connectors for more context

ChatGPT Deep Research, which is an AI research tool to automate research, is getting support for new connectors (integrations), including…

Two Linux flaws can lead to the disclosure of sensitive data
04
Jul
2025

Critical Sudo bugs expose major Linux distros to local Root exploits

Critical Sudo bugs expose major Linux distros to local Root exploits Pierluigi Paganini July 04, 2025 Critical Sudo flaws let…

How to Easily Escalate to Root on Linux Using the Latest Sudo Vulnerabilities
04
Jul
2025

How to Easily Escalate to Root on Linux Using the Latest Sudo Vulnerabilities

A newly disclosed pair of critical vulnerabilities in Sudo — the powerful Unix/Linux command-line tool that allows users to run…

From the FBI to F&A: lessons learnt in safeguarding systems and data
04
Jul
2025

From the FBI to F&A: lessons learnt in safeguarding systems and data

One might not typically expect a childhood on a Texas farm to lead to a career that involve investigating cybercriminals…

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
04
Jul
2025

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence

Security researchers have discovered novel ways to identify and take advantage of Microsoft Azure Arc in business settings, which is…

Hacker leaks Telefónica data allegedly stolen in a new breach
04
Jul
2025

Hacker leaks Telefónica data allegedly stolen in a new breach

A hacker is threatening to leak 106GB of data allegedly stolen from Spanish telecommunications company Telefónica in a breach that…

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
04
Jul
2025

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware

Cybercriminals are increasingly weaponizing legitimate software installer frameworks like Inno Setup to distribute malware, turning user-friendly tools into covert vehicles…

Ingram Micro
04
Jul
2025

Ingram Micro suffers global outage as internal systems inaccessible

IT giant Ingram Micro is experiencing a global outage that is impacting its websites and internal systems, with customers concerned…

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
04
Jul
2025

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning

A critical vulnerability, tracked as CVE-2025-49826, has been discovered and addressed in the popular React-based web framework, Next.js. The flaw, present…

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
04
Jul
2025

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are

Every security practitioner knows that employees are the weakest link in an organization, butthis is no longer the case. SquareX’s…