The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has once again highlighted the critical …
Security patches
-
-
advertisingAI in Cybersecurity
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a new malicious actor has emerged: the …
-
3D Modeling SoftwareAI in Cybersecurity
Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
by Priya Kapoorby Priya Kapoor 2 minutes readIn a significant move to bolster cybersecurity defenses, Microsoft recently unveiled a comprehensive patch …
-
AI in CybersecuritySoftware Security
Elevation-of-Privilege Vulns Dominate Microsoft’s Patch Tuesday
by Nia Walkerby Nia Walker 2 minutes readIn the ever-evolving landscape of cybersecurity, Microsoft’s recent Patch Tuesday brought forth a significant …
-
Cybersecurity in Retail
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
by Nia Walkerby Nia Walker 2 minutes readIn recent cybersecurity news, Fortinet SSL VPN devices have been targeted in a global …
-
AI in CybersecurityHealthcare IT SecurityNetwork Security
Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
by Lila Hernandez 2 minutes readIn recent cybersecurity news, a significant uptick in exploits targeting a critical vulnerability in …
-
AI in CybersecurityIT Infrastructure
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
by Samantha Rowland 2 minutes readTitle: Unveiling Windows EPM Poisoning Exploit: Safeguarding Against Domain Privilege Escalation In a recent …
-
AI in CybersecurityAppliances and Electronics
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
by Samantha Rowland 2 minutes readLinux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks In an alarming …
-
AI in CybersecurityCloud Security
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
by Samantha Rowland 2 minutes readCybersecurity landscape, always in motion, has recently witnessed a significant discovery. Researchers have unveiled …
-
3D Modeling SoftwareAI in CybersecurityHealthcare IT Security
Attackers Exploit Critical Trend Micro Apex One Zero-Day Flaw
by Lila Hernandez 2 minutes readIn recent cybersecurity news, attackers are capitalizing on critical vulnerabilities in Trend Micro’s Apex …