The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61…
Technology
Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry…
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks
Nov 13, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…
Google Expands Android Features in November 2025 Update
Image: Android TV Google has rolled out a new round of system service updates for Android…
Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy
Nov 12, 2025Ravie LakshmananArtificial Intelligence / Encryption Google on Tuesday unveiled a new privacy-enhancing technology called…
Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack
Nov 12, 2025Ravie LakshmananVulnerability / Patch Tuesday Microsoft on Tuesday released patches for 63 new security…
[Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR
Nov 12, 2025The Hacker NewsThreat Detection / Risk Management Every day, security teams face the same…
Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform
Nov 12, 2025Ravie LakshmananCybercrime / Malware Google has filed a civil lawsuit in the U.S. District…
Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws
Nov 12, 2025Ravie LakshmananNetwork Security / Zero-Day Amazon’s threat intelligence team on Wednesday disclosed that it…
Why Critical Infrastructure Needs Stronger Security
Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD’s importance has…