Category: EN

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-57819 Sangoma FreePBX Authentication Bypass Vulnerability  This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant…

WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users

A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users, the company has confirmed. The vulnerability, now identified as CVE-2025-55177, was combined with a separate vulnerability in Apple’s operating systems…

Cutting Through AppSec Noise in the Age of GenAI

The way organizations think about application security is shifting—fast. OX Security Co-Founder and CEO Neatsun Ziv talks about why the old playbook of “scan, list, and hand over to developers” has run its course. Ziv explains how the flood of…

The Hidden Costs of Fragmented Security Infrastructure

Cybersecurity conversations often focus on the latest threats, breaches, or AI-powered responses. But beneath the surface of every high-profile attack lies a quieter, more persistent challenge: fragmentation. Disconnected security tools, siloed data, and piecemeal visibility have become the norm—and the…

Fake Facebook Ads Push Brokewell Spyware to Android Users

A Facebook malvertising campaign is spreading the Brokewell spyware to Android users via fake TradingView ads. The malware… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Fake Facebook…

Tonic.ai product updates: August 2025

Introducing the Data Vending Machine, schema caching in Structural, strengthened synthesis in Textual, + Object and Array generators in Fabricate! The post Tonic.ai product updates: August 2025 appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Why OT Security Demands Context, Not Just Controls

Operational technology (OT) security is no longer a niche concern—it’s front and center in today’s cyber conversations. At Black Hat this year, OT had a real moment, signaling that protecting critical infrastructure has finally caught the broader security community’s attention.…