Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

Oct 15, 2025Ravie LakshmananVulnerability / Critical Infrastructure Cybersecurity researchers have disclosed two critical security flaws impacting…

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

Oct 15, 2025Ravie Lakshmanan Enterprise Software / Vulnerability SAP has rolled out security fixes for 13…

What AI Reveals About Web Applications— and Why It Matters

Before an attacker ever sends a payload, they’ve already done the work of understanding how your…

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

Oct 14, 2025Ravie LakshmananVulnerability / Mobile Security Android devices from Google and Samsung have been found…

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Oct 14, 2025Ravie LakshmananCyber Espionage / Network Security Threat actors with ties to China have been…

Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

Oct 14, 2025Ravie LakshmananVulnerability / Hardware Security Chipmaker AMD has released fixes to address a security…

How Threat Hunting Builds Readiness

Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave…

Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Oct 14, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have shed light on a previously undocumented…

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Oct 14, 2025Ravie LakshmananMalware / Typosquatting Cybersecurity researchers have identified several malicious packages across npm, Python,…

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

Oct 13, 2025Ravie LakshmananBrowser Security / Windows Security Microsoft said it has revamped the Internet Explorer…