CVE Alert: CVE-2025-30258
Vulnerability Summary: CVE-2025-30258 In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data...
Vulnerability Summary: CVE-2025-30258 In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data...
Gartner predicts that agentic AI will significantly expedite account takeovers, allowing threat actors to hijack accounts more efficiently within two...
Europol has raised an alarming concern about a growing 'shadow alliance' between state actors and criminals, leveraging digital and AI...
In 2025, phishing-as-a-service (PhaaS) attacks surged, with Sneaky 2FA joining the ranks of Tycoon 2FA and EvilProxy as significant threats....
The recent warning from CISA highlights a critical vulnerability in Fortinet products that is currently being exploited in ransomware attacks....
World-renowned physicist Brian Cox will explore the profound implications of quantum computing at Infosecurity Europe 2025. World-renowned physicist, Professor Brian...
A staggering rise in browser phishing attacks has been observed, with 752,000 recorded incidents representing a 140% increase year-over-year (YoY)...
Discover how a critical Windows vulnerability known as ZDI-CAN-25373 has been exploited by multiple state-sponsored groups for cyber-espionage since 2017....
HIBP In June 2024, spyware maker SpyX suffered a data breach that exposed almost 2M unique email addresses. The breach...
CISA Releases Twenty Industrial Control Systems Advisories CISA released twenty Industrial Control Systems (ICS) advisories on February 13, 2025. These...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software CISA and the Federal Bureau...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on...
CISA and Partners Release Advisory on Ghost (Cring) Ransomware Today, CISA—in partnership with the Federal Bureau of Investigation (FBI) and...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 18, 2025. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Seven Industrial Control Systems Advisories CISA released seven Industrial Control Systems (ICS) advisories on February 20, 2025. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 25, 2025. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on February 27, 2025. These...