Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

SonicWall has addressed high-severity vulnerabilities in its firewalls and email security appliances that could lead to denial-of-service attacks, arbitrary code execution, or unauthorized file access. The urgency of these patches highlights the critical nature of securing network infrastructure against potential exploitation.

Impact: SonicWall firewalls, SonicWall email security appliance
Remediation: Apply the latest patches provided by SonicWall for affected products.
Read Original
Actively Exploited

CISA has added CVE-2025-61757, a critical vulnerability in Oracle Fusion Middleware, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation. This vulnerability poses significant risks to federal networks, prompting CISA to urge timely remediation by all organizations to mitigate potential cyberattacks.

Impact: Oracle Fusion Middleware
Remediation: Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by the due date as per Binding Operational Directive (BOD) 22-01. Organizations are strongly urged to prioritize timely remediation of vulnerabilities listed in the KEV Catalog to protect against active threats.
Read Original

SquareX has alleged a vulnerability in the Comet browser that allows for the execution of local commands through a hidden API, while Perplexity disputes these claims, labeling the research as fake. This disagreement highlights potential security concerns regarding the Comet browser and the credibility of vulnerability disclosures in the cybersecurity community.

Impact: Comet browser
Remediation: N/A
Read Original

IT admins face the challenge of securing corporate data while maintaining employee productivity in a mobile environment. Samsung is increasingly chosen by enterprises for its mobile security solutions, addressing the need for effective protection against risks associated with mobile devices.

Impact: Samsung mobile devices
Remediation: N/A
Read Original

Runlayer has recently emerged from stealth mode after four months of operation, securing $11 million in funding. The company has already acquired dozens of customers, including eight unicorns, indicating strong market interest and potential impact in the cybersecurity landscape.

Impact: N/A
Remediation: N/A
Read Original

The article discusses the ToddyCat APT attacks that target corporate email systems, highlighting the use of advanced tools like TomBerBil, TCSectorCopy, and XstReader. The severity of these attacks lies in their method of stealing access tokens from Outlook, posing significant risks to corporate security.

Impact: Corporate email systems, Outlook
Remediation: N/A
Read Original

The ShinyHunters hackers have successfully compromised Salesforce instances through vulnerabilities in customer-managed Gainsight applications, leading to significant data theft. This incident highlights the critical need for enhanced security measures in integrations between third-party applications and major platforms like Salesforce.

Impact: Salesforce instances, Gainsight applications
Remediation: Implement enhanced security protocols for Gainsight integrations, conduct thorough security audits of connected applications, and monitor for suspicious activity.
Read Original

The SEC has dropped its lawsuit against SolarWinds and its CISO Timothy G. Brown, which accused the company of misleading investors regarding its security practices related to the 2020 supply chain attack. This decision marks the end of a lengthy scrutiny period, raising questions about accountability in cybersecurity practices within major firms.

Impact: N/A
Remediation: N/A
Read Original

The article highlights Iran's cyber-espionage strategy, which focuses on dual-use targeting to gather information that serves both military and political purposes. This approach raises concerns about the implications for international security and the potential for increased tensions in geopolitical relations.

Impact: N/A
Remediation: N/A
Read Original

The article draws parallels between the efficiency of a Formula 1 pit crew and the operational principles that modern security teams should adopt. It emphasizes the importance of teamwork, quick decision-making, and strategic planning in enhancing cybersecurity measures.

Impact: N/A
Remediation: N/A
Read Original

The article discusses the challenges faced by Chief Information Security Officers (CISOs) in hiring within the cybersecurity field, particularly in the context of artificial intelligence's impact on the talent pipeline. It emphasizes the need to revive the hacker ethos to attract and retain skilled professionals, highlighting a potential long-term threat to the cybersecurity workforce if these issues are not addressed.

Impact: N/A
Remediation: N/A
Read Original
PreviousPage 98 of 101Next