1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...

TACACS+ Authentication Bypass Flaw Exposes Devices to Full Compromise 

Cybersecurity experts are concerned about a high-impact vulnerability in Fortinet’s FortiOS, FortiProxy, and FortiSwitchManager, designated as CVE-2025-22252. The vulnerability could allow the attacker to circumvent authentication and gain privileges as an administrator on enterprise networks that deploy Fortinet security appliances.   What is CVE-2025-22252?  CVE-2025-22252 is an authentication for critical function…
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

Phishing Campaign Targets WooCommerce Stores with Fake Security Alerts

Recently, a sophisticated phishing campaign targeted WooCommerce store owners by falsely reporting critical vulnerabilities, then tricking victims into installing malware – disguised as an essential security patch.. Security researchers and WooCommerce’s team have issued alerts to help make store owners aware and keep themselves safe. We summarize everything you need…
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

Unauthorized Certificates Issued for Alibaba Cloud Due to SSL.com CA Flaw

A critical vulnerability in the SSL.com domain validation process allowed unauthorized parties to get the certificates on behalf of you or your organisation. SSL.com is one of the famous Certificate Authorities (CA) trusted by all major browsers. This Vulnerability is reported by security researchers; in their demonstration, they showed how…
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

New SSL-VPN Symlink Exploit Enables Silent FortiGate Compromise

Fortinet, a leading cybersecurity company, has released an urgent alert revealing that hackers have found a new technique to maintain unauthorized, read-only access to FortiGate devices even after they have been patched for known vulnerabilities. This exploit involves the use of symbolic links (symlinks) within the SSL-VPN feature that allows…
1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...

The Critical Severity Vulnerability in the Next.js Framework (CVE-2025-29927)

One of the most famous JavaScript frameworks, “Next.Js,” has critical security with a CVE base score of 9.1 by NIST. Next.js is a React framework that provides a structured approach and additional features for building web applications, including server-side rendering and static site generation, built on top of the React…
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

Apache Pinot Vulnerability (CVE-2024-56325) Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has recently been discovered in Apache Pinot, a real-time distributed OLAP data store, leading to disastrous consequences for its user base. This flaw allows unauthenticated attackers to perform authentication bypasses and gain access to sensitive systems. The vulnerability is rated 9.8 on the CVSS scale, which…
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 5.00 out of 5)
Loading...

37,000+ VMware ESXi Instances at Risk Due to Zero-Day Vulnerabilities

A large number of VMware ESXi and Workstation and Fusion installations remain vulnerable to three zero-day vulnerabilities that cyber attackers already exploit to damage corporate IT systems. Three CVEs, CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have been weaponized by cyber attackers; thus, Broadcom and CISA issued immediate user warnings. Organizations need to…
1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...

Critical OpenSSH Vulnerabilities Expose Systems to MitM and DoS Attacks

OpenSSH is a Secure Remote Administration Tool for the Linux and Unix-based systems. It has been identified with two high threats exposing the server and client-side to MitM and Denial of Service attacks, namely CVE-2025-26465 and CVE-2025-26466, which were discovered by security researchers working for Qualys. Unsurprisingly, they did this…
1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
Loading...

Critical Zero-Day Vulnerability Exploited in Fortinet Devices

A zero-day vulnerability has been identified and actively exploited in Fortinet´s security appliances that would let the threat actors compromise firewalls and infiltrate enterprise networks. The vulnerability, tracked as CVE-2024-55591, affects multiple versions of FortiOS and FortiProxy and allows attackers to bypass authentication and gain super-admin privileges. This in-depth analysis…
1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
Loading...

Palo Alto Urges PAN-OS Users to Update for DoS Flaw Mitigation

Cybersecurity is a moving target, with organizations and vendors at the forefront of protecting their systems from the newest threats. In a significant development, leading cybersecurity company Palo Alto Networks has released a critical patch to fix a denial-of-service (DoS) vulnerability in its PAN-OS software. If left patched, the vulnerability…
1 Star2 Stars3 Stars4 Stars5 Stars (6 votes, average: 5.00 out of 5)
Loading...

Over 90,000 WordPress Sites Exposed Due to Security Flaws in Jupiter X Core Plugin

In a recent cybersecurity alert, researchers have uncovered critical vulnerabilities in the popular Jupiter X Core WordPress plugin, which is currently installed on over 90,000 websites globally. This plugin has been identified as having security flaws that could potentially allow attackers to execute arbitrary code and take control of affected…
1 Star2 Stars3 Stars4 Stars5 Stars (10 votes, average: 5.00 out of 5)
Loading...

What are Zero-Day Exploits, Attacks & Vulnerabilities? CVE vs 0day: Difference

Introduction Among the cybersecurity community, the concept of zero-day has emerged to be the most feared one as it casts a dark shadow on organizations and people of all sorts. Vulnerabilities, zero-day attacks, and exploits are the kinds of threats that mostly come in the way of ensuring cybersecurity in…
1 Star2 Stars3 Stars4 Stars5 Stars (10 votes, average: 5.00 out of 5)
Loading...

Serious Vulnerabilities in Apache HTTP Server Allow Cybercriminals Exploit Millions of Sites

The Apache Software Foundation has made public several critical vulnerabilities in the Apache HTTP Server that could have a devastating impact, leaving millions of websites vulnerable to hacking attempts. Apache HTTP Server web server – A popular choice for millions of websites worldwide. The risks caused by these vulnerabilities are…
1 Star2 Stars3 Stars4 Stars5 Stars (12 votes, average: 5.00 out of 5)
Loading...

Check Point Alerts Users to Zero-Day Attacks on Their VPN Gateway Products

Check Point released a security alert on May 28, 2024, regarding CVE-2024-24919. This high-severity information disclosure vulnerability affects Check Point Security Gateway devices set up with the “IPSec VPN” or “Mobile Access” software blade. Check Point is warning users about a zero-day vulnerability that threat actors have been exploiting in…
1 Star2 Stars3 Stars4 Stars5 Stars (9 votes, average: 5.00 out of 5)
Loading...

Palo Alto Firewalls were affected by Exploited Vulnerability of CVE-2024-3400

Palo Alto Networks PAN-OS firewalls have been subject to an increased number of attempts at exploitation since the finding of CVE-2024-3400 on April 12, 2024. Recently, Palo Alto Networks identified and fixed a serious flaw in the GlobalProtect function of its PAN-OS software. But again, information from the Shadowserver Foundation…