CVE Alert: CVE-2025-0842
Vulnerability Summary: CVE-2025-0842 A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects...
Vulnerability Summary: CVE-2025-0842 A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects...
Vulnerability Summary: CVE-2025-0843 A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected...
Vulnerability Summary: CVE-2025-0851 A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows...
Vulnerability Summary: CVE-2025-21396 Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network. Affected Endpoints:...
Vulnerability Summary: CVE-2025-21415 Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over...
Ransomware Group: KILLSEC VICTIM NAME: payahmedabadechallanorg NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The UK government's IT systems are facing serious security vulnerabilities, prompting calls for improved cyber resilience across departments. The National...
In 2024, breakout time for cyber-attacks has shrunk by 22%, heightening the challenge for cybersecurity professionals to respond effectively. Threat...
Cybercriminals have increasingly targeted government websites due to their vulnerabilities, leveraging trust associated with these domains for phishing schemes. New...
Nation-state hackers are increasingly exploiting Google's Gemini AI tool for their cyber operations. This article explores how various countries are...
DeepSeek, a year-old Chinese GenAI startup, is shaking up the tech world with its new large language model, R1, raising...
The rise of AI has led to a staggering 1205% increase in API vulnerabilities, highlighting a crucial security concern for...
The newly emerged HellCat ransomware gang is leveraging psychological tactics to attract media attention and pressure victims into paying extortion...
Ransomware Group: TERMITE VICTIM NAME: Zschimmer and Schwarz NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: FOG VICTIM NAME: Gitlabs: Prasaga, HE2B, Kombinat NOTE: No files or stolen information are by RedPacket Security. Any...
Fortinet Releases Security Updates for FortiManager Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on January 7, 2025. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases the Cybersecurity Performance Goals Adoption Report Today, CISA released the Cybersecurity Performance Goals Adoption Report to highlight how...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Four Industrial Control Systems Advisories CISA released four Industrial Control Systems (ICS) advisories on January 10, 2025. These...
CISA Adds One Vulnerability to the KEV Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...