VULNERABILITIES 34
- Google fixes two Android zero days exploited in attacks, 107 flaws
- Security researchers caution app developers about risks in using Google Antigravity
- Old tech, new vulnerabilities - NTLM abuse, ongoing exploitation in 2025
- Security Affairs newsletter Round 551 by Pierluigi Paganini – INTERNATIONAL EDITION
- Siemens COMOS
- Microsoft Patch Tuesday for November 2025 — Snort rules and prominent vulnerabilities
- Dangerous runC flaws could allow hackers to escape Docker containers
- HackedGPT – 7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
- Critical flaws in Fuji Electric, Delta Electronics, Survision, Radiometrics, IDIS systems raise security concerns for industrial sector
- Exploiting Microsoft Teams Impersonation and Spoofing Vulnerabilities Exposed
- OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
- TP-Link warns of critical command injection flaw in Omada gateways
- Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities
- F5 releases BIG-IP patches for stolen security vulnerabilities
- Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
- CISA issues Emergency Directive requiring federal agencies to mitigate critical Cisco ASA zero-day vulnerabilities
- Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
- Google's August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
- ReVault! When your SoC turns against you…
- Hackers Regularly Exploit Vulnerabilities Before Public Disclosure, Study Finds
- Dahua Camera flaws allow remote hacking. Update firmware now
- Struts Devmode in 2025? Critical Pre-Auth Vulnerabilities in Adobe Experience Manager Forms
- ToolShell, SharePoint, and the Death of the Patch Window
- ToolShell An all-you-can-eat buffet for threat actors
- Critical Vulnerabilities Found in Tridium Niagara Framework
- The Linuxsys Cryptominer
- Asus and Adobe vulnerabilities
- AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
- Decrement by one to rule them all AsIO3.sys driver exploitation
- Trix Shots Remote Code Execution on Aviatrix Controller
- Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites
- Multiple CVEs in Infoblox NetMRI RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
- New Linux Vulnerabilities Expose Password Hashes via Core Dumps