Microsoft has confirmed active exploitation of a critical privilege escalation vulnerability in the Windows Ancillary Function Driver for WinSock, tracked as CVE-2025-32709. This use-after-free flaw enables local attackers with basic user privileges to gain SYSTEM-level access, posing significant risks to…
Category: EN
NSFOCUS WAF Selected in the 2025 Gartner® Market Guide for Cloud Web Application and API Protection
Santa Clara, Calif. May 14, 2025 – Recently, Gartner released the “Market Guide for Cloud Web Application and API Protection”[1], and NSFOCUS was selected as a Representative Vendor with its innovative WAAP solution. We believe this recognition reflects the technical accumulation…
SecuX releases Bitcoin self-managed solution for SMBs
SecuX launched hardware-based cybersecurity solution tailored for small and medium-sized businesses (SMBs). At the core is Cyber Athena, an enterprise-grade cold wallet that integrates PUF-based authentication via PUFido and PUFhsm hardware modules, designed to meet rising demand for secure, self-managed…
Resilience helps businesses understand their cyber risk in financial terms
Resilience launched Cyber Risk Calculator to provide organizations with a financial snapshot of their cyber risk. The AI-powered tool provides security and risk practitioners and C-Suite executives alike with a common, data-driven language to better understand and quantify their cyber risk.…
Microsoft Fixes Seven Zero-Days in May Patch Tuesday
Microsoft has patched seven zero-day bugs, five of which were exploited in the wild This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Seven Zero-Days in May Patch Tuesday
Earth Ammit Hackers Deploy New Tools to Target Military Drones
The threat actor group known as Earth Ammit, believed to be associated with Chinese-speaking APTs, has emerged as a significant concern for military and industrial sectors in Eastern Asia. This group orchestrated two distinct campaigns-VENOM and TIDRONE-primarily targeting Taiwan and…
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers
Ivanti has released patches for two EPMM vulnerabilities that have been chained in the wild for remote code execution. The post Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers appeared first on SecurityWeek. This article has been indexed from…
New Windows RDP Vulnerability Enables Network-Based Attacks
Microsoft has disclosed two critical vulnerabilities in its Windows Remote Desktop services that could allow attackers to execute arbitrary code on vulnerable systems over a network. Designated CVE-2025-29966 and CVE-2025-29967, these heap-based buffer overflow flaws affect the Windows Remote Desktop…
Critical Microsoft Office Vulnerabilities Enable Malicious Code Execution
Microsoft has addressed three critical security flaws in its Office suite, including two vulnerabilities rated Critical and one Important, all enabling remote code execution (RCE) via use-after-free memory corruption weaknesses. These vulnerabilities, disclosed between March and May 2025, expose systems…
New Microsoft Scripting Engine Vulnerability Exposes Systems to Remote Code Attacks
Critical zero-day vulnerability in Microsoft’s Scripting Engine (CVE-2025-30397) has been confirmed to enable remote code execution (RCE) attacks over networks, raising urgent concerns for enterprises and individual users alike. The flaw, classified as a type confusion weakness (CWE-843), allows attackers…
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact
Industrial giants Siemens, Schneider Electric and Phoenix Contact have released ICS security advisories on the May 2025 Patch Tuesday. The post ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact appeared first on SecurityWeek. This article has been indexed…
Radware clarifies patch, retailer data stolen, Alabama suffers cyberattack
Radware says recently WAF bypasses were patched in 2023 Marks & Spencer confirms data stolen in ransomware attack Alabama suffers cybersecurity event Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like…right…
PowerSchool shows why ransom payments don’t work
Earlier this year, PowerSchool reported a major cyber incident. Hackers managed to steal vast amounts of data from the popular student information system. The company… The post PowerSchool shows why ransom payments don’t work appeared first on Panda Security Mediacenter.…
Ransomware scum have put a target on the no man’s land between IT and operations
Defenses are weaker, and victims are more likely to pay, SANS warns Criminals who attempt to damage critical infrastructure are increasingly targeting the systems that sit between IT and operational tech.… This article has been indexed from The Register –…
Mark’s and Spencer Data Breach, Vulnerable Routers, Fortinet Exploits, and New Ransomware Threats
In this episode of Cybersecurity Today, host Jim Love covers recent cybersecurity incidents including a data breach at Mark’s and Spencer, the FBI’s alert on outdated routers being exploited, and critical Fortinet vulnerabilities actively used in attacks. Additionally, the episode…
LastPass launches SaaS Monitoring to reduce shadow IT and AI risks
LastPass has announced the general availability of SaaS Monitoring. This new capability empowers organizations of all sizes to gain visibility into their Software-as-a-Service ecosystem, reduce risk from Shadow IT and Shadow AI, and optimize costs. The post LastPass launches SaaS…
Google to enhance security with Advanced Protection with Android 16
Google, the global leader in the tech world, is gearing up to roll out a major security update for users upgrading to Android 16 or later. The beta version of this operating system is already running on select Pixel and…
The Power of Immutable Data Storage in Defending Against Ransomware Attacks
In today’s sophistication driven world, ransomware attacks have become one of the most pervasive and damaging forms of cybercrime. These attacks, which involve hackers encrypting a victim’s data and demanding a ransom for its release, can cripple businesses, institutions, and…
AI Is Already in Your Org—Are You Securing It All?
It’s been impossible to avoid the buzz around generative AI, especially since ChatGPT took the world by storm. And while tools like DeepSeek, Mistral, and LLaMA are reshaping the open-source frontier, one thing is certain: generative AI is here to…
Critical 0-Day in Windows DWM Enables Privilege Escalation
Microsoft has disclosed a significant security vulnerability (CVE-2025-30400) affecting the Windows Desktop Window Manager (DWM) that is actively being exploited in the wild. The flaw, rated as “Important” with a CVSS score of 7.8, allows attackers with local access to…