Tag: EN

Top 20 Most Exploited Vulnerabilities of 2025: A Comprehensive Analysis

The cybersecurity landscape of 2025 has been marked by an unprecedented surge in vulnerability exploitation, with threat actors leveraging critical flaws across enterprise software, cloud infrastructure, and industrial systems. This comprehensive analysis examines the twenty most dangerous exploited vulnerabilities of…

Gladinet CentreStack Flaw Exploited to Hack Organizations

Threat actors have hacked at least nine organizations by exploiting the recently patched Gladinet CentreStack flaw. The post Gladinet CentreStack Flaw Exploited to Hack Organizations appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…

Cisco-Trained Hackers Lead Sophisticated Attacks on Cisco Devices

Cisco-trained hackers led a nation-state espionage campaign against global telecom networks. The post Cisco-Trained Hackers Lead Sophisticated Attacks on Cisco Devices appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Cisco-Trained Hackers…

Critical GitLab Vulnerabilities Expose DevOps Pipelines

GitLab patched critical flaws that could enable XSS, denial-of-service attacks, and authentication bypasses. The post Critical GitLab Vulnerabilities Expose DevOps Pipelines appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Critical GitLab…

Jenkins DoS Vulnerability Lets Attackers Freeze CI/CD Pipelines

A Jenkins denial-of-service vulnerability allows attackers to freeze CI/CD pipelines and disrupt build operations. The post Jenkins DoS Vulnerability Lets Attackers Freeze CI/CD Pipelines appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

Fieldtex Data Breach Impacts 238,000

The Akira ransomware group took credit for the Fieldtex Products hack in November, claiming to have stolen 14 Gb of data. The post Fieldtex Data Breach Impacts 238,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

3 Compliance Processes to Automate in 2026

For years, compliance has been one of the most resource-intensive responsibilities for cybersecurity teams. Despite growing investments in tools, the day-to-day reality of compliance is still dominated by manual, duplicative tasks. Teams chase down screenshots, review spreadsheets, and cross-check logs,…