Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning
Sep 12, 2025Ravie LakshmananVulnerability / Cyber Espionage The U.S. Cybersecurity and Infrastructure…
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles…
FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert…
Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms
Sep 12, 2025Ravie Lakshmanan Apple has notified users in France of a…
Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
Sep 12, 2025Ravie LakshmananVulnerability / Mobile Security Samsung has released its monthly…
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
A security weakness has been disclosed in the artificial intelligence (AI)-powered code…
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Sep 11, 2025Ravie LakshmananArtificial Intelligence / Mobile Security Google on Tuesday announced…
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers
Threat actors affiliated with the Akira ransomware group have continued to target…
CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
Cybersecurity researchers have discovered two new malware families, including a modular Apple…


