Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
Dec 03, 2025Ravie LakshmananVulnerability / Cloud Security A maximum-severity security flaw has…
Why Organizations Are Turning to RPAM
Nov 28, 2025The Hacker NewsEnterprise Security / Threat Detection As IT environments…
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Nov 28, 2025Ravie LakshmananEmail Security / Enterprise Security Cybersecurity researchers have shed…
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
Nov 27, 2025Ravie LakshmananWeb Security / Zero Trust Microsoft has announced plans…
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Nov 27, 2025Ravie LakshmananRansomware / Cloud Security Gainsight has disclosed that the…
Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets
The second wave of the Shai-Hulud supply chain attack has spilled over…
Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys
Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security New research has found…
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability Multiple security vendors are sounding…
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five…


