Oct 15, 2025Ravie LakshmananVulnerability / Critical Infrastructure Cybersecurity researchers have disclosed two critical security flaws impacting…
Technology
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
Oct 15, 2025Ravie Lakshmanan Enterprise Software / Vulnerability SAP has rolled out security fixes for 13…
What AI Reveals About Web Applications— and Why It Matters
Before an attacker ever sends a payload, they’ve already done the work of understanding how your…
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Oct 14, 2025Ravie LakshmananVulnerability / Mobile Security Android devices from Google and Samsung have been found…
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Oct 14, 2025Ravie LakshmananCyber Espionage / Network Security Threat actors with ties to China have been…
Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing
Oct 14, 2025Ravie LakshmananVulnerability / Hardware Security Chipmaker AMD has released fixes to address a security…
How Threat Hunting Builds Readiness
Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave…
Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
Oct 14, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have shed light on a previously undocumented…
npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
Oct 14, 2025Ravie LakshmananMalware / Typosquatting Cybersecurity researchers have identified several malicious packages across npm, Python,…
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
Oct 13, 2025Ravie LakshmananBrowser Security / Windows Security Microsoft said it has revamped the Internet Explorer…