In a recent turn of events, Google has swiftly responded to a critical security …
Known Exploited Vulnerabilities
-
-
AI in CybersecurityCorporate Data ProtectionIT security
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed
by Priya Kapoorby Priya Kapoor 2 minutes readIn a significant development for cybersecurity professionals, the U.S. Cybersecurity and Infrastructure Security Agency …
-
AI in CybersecurityIT securitySoftware Security
CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
by Nia Walkerby Nia Walker 2 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently made a significant move …
-
AI in CybersecurityIT security
CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
by Samantha Rowland 2 minutes readIn a recent development that has sent ripples through the cybersecurity community, the U.S. …
-
AI in CybersecurityCloud SecurityData Security
CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability Enabling RCE Attacks
by Lila Hernandez 2 minutes readThe recent warning from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) regarding CentreStack’s …
-
Artificial intelligence in cybersecurityIT securityRetail Technology
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List
by Jamal Richaqrds 1 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) continues to be at the forefront …
-
AI in Software DevelopmentArtificial intelligence in cybersecurity
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
by Lila Hernandez 2 minutes readIn a move that underscores the evolving landscape of cybersecurity threats, the U.S. Cybersecurity …
-
AI in Software DevelopmentArtificial intelligence in cybersecurity
Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
by Priya Kapoorby Priya Kapoor 2 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently raised alarms by flagging two …
-
AI in Software DevelopmentArtificial intelligence in cybersecurity
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability
by Samantha Rowland 2 minutes readIn recent news, Microsoft has taken swift action to address two Critical-rated vulnerabilities affecting …
-
Cybersecurity in Retail
CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity, staying ahead of potential threats is paramount. Recently, …
- 1
- 2