
SAP Security Patch Day Addresses 21 Vulnerabilities, 4 Classified as Critical
SAP’s Security Patch Day on September 9, 2025, introduced fixes for 21 newly discovered vulnerabilities…
SessionReaper Vulnerability Puts Magento & Adobe Commerce Sites in Hacker Crosshairs
Adobe has broken its regular patch schedule to address CVE-2025-54236, a critical vulnerability in Magento…
How a Single Faulty Windows Driver Can Crash Your System and Cause Blue Screen of Death
Windows devices rely on a complex ecosystem of drivers to manage hardware and software interactions.…
U.S. Cracks Down on Scam Networks in Southeast Asia Draining Billions
In a sweeping effort to curb transnational cybercrime and human rights abuses, the U.S. Department…
New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
A new exploitation method has been discovered for the Linux kernel use-after-free (UAF) vulnerability tracked as CVE-2024-50264. The…
Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
Jaguar Land Rover’s UK factories will remain closed until at least Wednesday as the company…
MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT…
New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access
The Akamai Hunt Team has uncovered a new strain of malware that targets exposed Docker…
New AI Email Attack Tool Fueling Massive Phishing Operations
A novel AI-driven email attack toolkit named SpamGPT has surfaced on underground hacking forums, promising cybercriminals an…
New Cyber Attack Exploits DeskSoft to Spread Malware via RDP Command Execution
An emerging threat campaign has been identified that weaponizes a trojanized version of DeskSoft’s EarthTime…