96Articles
7Categories
2025-11-14Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-64446 Fortinet FortiWeb Path Traversal Vulnerability  This type of vulnerability is a frequent attack vector for malicious cyber act…
KEV
🚨
Fortinet Confirms Active Exploitation of Critical FortiWeb VulnerabilitySecurity firms say the flaw has been actively exploited for weeks, even as Fortinet quietly shipped fixes and CISA added the bug to its KEV catalog. The post Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability appeared first on SecurityWeek .
KEV
🚨
Fortinet Releases Security Advisory for Relative Path Traversal Vulnerability Affecting FortiWeb ProductsCISA is aware of exploitation of a newly disclosed vulnerability, CVE-2025-64446 , in Fortinet FortiWeb, a web application firewall. This vulnerability affects the following FortiWeb versions: 1 8.0.0 through 8.0.1 7.6.0 through 7.6.4 7.4.0 through 7.4.9 7.2.0 through 7.2.11 7.0.…
KEV
🐛
Palo Alto PAN-OS Flaw Lets Attackers Force Firewall Reboots via Malicious Packets
🐛
Critical Zoho Analytics Plus Flaw Allows Attackers to Run Arbitrary SQL Queries
🐛
Copy-paste vulnerability hit AI inference frameworks at Meta, Nvidia, and Microsoft
🐛
NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks
🐛
Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges
🐛
"Patched" but still exposed: US federal agencies must remediate Cisco flaws (again) - Help Net Security
🐛
Vulnerability-Lookup 2.18.0 - Integration with Rulezet
🐛
AL25-017 - Vulnerability impacting Fortinet FortiWeb – CVE-2025-64446
⚠️
Agentic AI opens door to new ID challenges: Report
⚠️
Fortinet FortiWeb Zero-Day Exploited to Gain Full Admin Access
KEV
⚠️
Cybersecurity Today: Oracle Breach, CrowdStrike Report, and New iPhone Scam
⚠️
Critical Imunify360 Vulnerability Exposes Millions of Linux-Hosted Sites to RCE Attacks
⚠️
Washington Post Oracle E-Suite Breach Exposes Data of Over 9,000 Staff and Contractors
⚠️
Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch
KEV
⚠️
Imunify360 Vulnerability Could Expose Millions of Sites to Hacking
⚠️
Fighting AI with AI: Adversarial bots vs. autonomous threat hunters
⚠️
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
⚠️
Akira Ransomware Group Made $244 Million in Ransom Proceeds
⚠️
Vulnerability Management: Tackling the Wrong Problem
⚠️
Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser
⚠️
Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
⚠️
US announces new strike force targeting Chinese crypto scammers
⚠️
Fortinet FortiWeb flaw with public PoC exploited to create admin users
⚠️
In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
⚠️
Arista, Palo Alto bolster AI data center security
⚠️
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
⚠️
RCE flaw in ImunifyAV puts millions of Linux-hosted sites at risk
⚠️
Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks
⚠️
CYBERCOM 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls
⚠️
From detection to response: Why confidence is the real game changer
⚠️
Why network visibility is the thread that holds cybersecurity together
⚠️
How shadow IT leaves every industry in the dark
⚠️
Why SOC efficiency is the most valuable currency in cybersecurity
⚠️
Friday Squid Blogging: Pilot Whales Eat a Lot of Squid
⚠️
A Vulnerability in FortiWeb Could Allow for Remote Code Execution
📢
CISA Warns: Akira Ransomware Has Extracted $42M After Targeting Hundreds
📢
Bundestag beschließt NIS2-Umsetzung
📢
Splunk security advisory (AV25-754)
📢
Microsoft Edge security advisory (AV25-755)
📢
Your KnowBe4 Compliance Plus Fresh Content Updates from October 2025
📢
CISA warns of Akira ransomware Linux encryptor targeting Nutanix VMs
📢
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks
📢
FBI calls Akira ‘top five’ ransomware variant out of 130 targeting US businesses | CyberScoop
📢
Samsung mobile security advisory (AV25-757)
📢
HPE security advisory (AV25-756)
📢
Fortinet security advisory (AV25-758)
📢
2025 Cybersecurity Awareness Month by the Numbers
📢
Cisco security advisory (AV25-759)
🔥
Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage
🔥
Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign
🔥
Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign
🔥
Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
🔥
Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
🔥
Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials
🔥
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
🔥
Checkout.com Discloses Data Breach After Extortion Attempt
🔥
Anthropic’s AI used in automated attacks
🔥
The State of Ransomware – Q3 2025 - Check Point Research
🔥
Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta - Infosecurity Magazine
🔥
Washington Post data breach impacts nearly 10K employees, contractors
🔥
Kraken ransomware benchmarks systems for optimal encryption choice
🔥
Checkout.com snubs hackers after data breach, to donate ransom instead
🔥
Operation Endgame Hits Rhadamanthys, VenomRAT, Elysium Malware, seize 1025 servers – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
🔥
Anthropic claims of Claude AI-automated cyberattacks met with doubt
🔥
Logitech confirms data breach after Clop extortion attack
🔥
Ransomware: The Double Dipping Threat
🔥
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
🔥
Redefining Enterprise Defense in the Era of AI-Led Cyberattacks
🕵️
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data
🕵️
ISC Stormcast For Friday, November 14th, 2025 https://isc.sans.edu/podcastdetail/9700, (Fri, Nov 14th)
🕵️
Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications
🕵️
Press Release: CIO100 and CSO30 ASEAN Awards 2025 Celebrate Regional Excellence in Technology Leadership
🕵️
Google Says Chinese ‘Lighthouse’ Phishing Kit Disrupted Following Lawsuit
🕵️
Microsoft Teams Introduces Premium Feature to Prevent Screenshots and Screen Recording
🕵️
Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover
🕵️
Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign
🕵️
Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
🕵️
Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
🕵️
Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
🕵️
RONINGLOADER Uses Signed Drivers to Disable Microsoft Defender and Bypass EDR
🕵️
Popular Android-based photo frames download malware on boot
🕵️
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
🕵️
Chinese spies used Claude to break into critical orgs • The Register
🕵️
Upcoming Speaking Engagements
🕵️
Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’
🕵️
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
🕵️
CISO, CIO, CTO: Business Leaders First
🕵️
New Android Malware Platform Targets Bank Accounts
🕵️
Five plead guilty to helping North Koreans infiltrate US firms
📡
ASUS warns of critical auth bypass flaw in DSL series routers
📡
Google backpedals on new Android developer registration rules
📡
The Role of Humans in an AI-Powered World
📡
Microsoft Office Russian Dolls, (Fri, Nov 14th)