Author: wordpress

IXON VPN Client Vulnerability Let Attackers Escalate Privileges

Significant vulnerabilities in the IXON VPN Client allow local attackers to gain system-level privileges on Windows, Linux, and macOS systems.  The flaws, tracked as CVE-2025-26168 and CVE-2025-26169, affect versions prior to 1.4.4 and could grant unauthorized users complete control over…

Europol Announces More DDoS Service Takedowns, Arrests

Four people have been arrested in Poland and several websites associated with DDoS-for-hire services have been shut down. The post Europol Announces More DDoS Service Takedowns, Arrests appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

VdS-Sicherheitsfachtagung 2025 in Köln

Am 25. und 26. Juni 2025 wird die VdS-Sicherheitsfachtagung mit begleitender Fachausstellung im Pullman Hotel in Köln sowie online im Livestream stattfinden. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: VdS-Sicherheitsfachtagung 2025 in Köln

Mitel SIP-Phones lassen sich beliebige Befehle unterjubeln

Durch teils kritische Sicherheitslücken in Mitels SIP-Phones können Angreifer verwundbaren Geräten beliebige Befehle unterschieben. Dieser Artikel wurde indexiert von heise security News Lesen Sie den originalen Artikel: Mitel SIP-Phones lassen sich beliebige Befehle unterjubeln

Iranian Hackers Posing as Model Agency to Target Victims

Unit 42, the threat intelligence arm of Palo Alto Networks, has exposed a covert operation likely orchestrated by Iranian cyber actors. The campaign involves a fraudulent website, megamodelstudio[.]com, meticulously designed to impersonate the Hamburg-based Mega Model Agency. Cyberespionage Campaign Uncovered…

Employee Spotlight: Getting to Know Tom De Laet

 Tom, can you tell us a bit about yourself? Currently I have the privilege of leading the Incident Response Team for EMEA at Check Point, based in Belgium, where I live with my wife and two daughters. My journey into…

Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details

A significant vulnerability in Microsoft Bookings allowed attackers to manipulate meeting details by exploiting insufficient input validation.  The flaw, which Microsoft has largely remedied, enabled malicious actors to inject arbitrary HTML into meeting invitations, alter calendar entries, and potentially facilitate…