On October 22, 2025, the Internet Systems Consortium (ISC) disclosed three high-severity vulnerabilities in BIND 9, the widely used Domain Name System (DNS) software. These […]
Category: Cybersecurity News
Stay informed about the ever-evolving world of digital threats and defenses with our Cyber Security News category. Here, you’ll find the latest breaking news, in-depth analysis, and expert insights on everything related to cybersecurity. From data breaches and ransomware attacks to emerging threats and innovative security solutions, we cover the critical issues impacting individuals, businesses, and governments worldwide. Keep up-to-date on the latest vulnerabilities, best practices, and trends shaping the future of online security.
Critical Vulnerabilities in Oracle VM VirtualBox Pose Significant Security Risks
Oracle has recently disclosed multiple critical vulnerabilities in its Oracle VM VirtualBox virtualization software, potentially allowing attackers to achieve complete control over the VirtualBox environment. […]
Critical ‘TARmageddon’ Vulnerability in Rust Libraries Enables Remote Code Execution
A significant security flaw, known as TARmageddon and designated as CVE-2025-62518, has been identified in the Rust programming language’s async-tar library and its derivatives, notably […]
Impacket Tool in Kali Linux Receives Major Upgrade with Enhanced Attack Paths and Relay Techniques
The Impacket toolkit, a cornerstone in penetration testing, has undergone a significant upgrade within the Kali Linux repository. Managed by Fortra’s cybersecurity team, this latest […]
Critical Path Traversal Vulnerability in Jira Software Allows Arbitrary File Modification
Atlassian has recently identified a significant security flaw in its Jira Software Data Center and Server platforms. This vulnerability, cataloged as CVE-2025-22167, is a path […]
Critical Vulnerability in Motex LANSCOPE Endpoint Manager Exploited in Active Cyberattacks
A critical security flaw has been identified in Motex LANSCOPE Endpoint Manager, a widely used tool for managing IT assets across networks. This vulnerability, designated […]
Critical ‘SessionReaper’ Vulnerability in Adobe Magento Actively Exploited, Majority of Stores at Risk
A critical security flaw, identified as CVE-2025-54236 and dubbed SessionReaper, has been discovered in Adobe’s Magento e-commerce platform. This vulnerability allows unauthenticated attackers to hijack […]
Perplexity’s Comet Browser Vulnerability Exposes Users to Malicious Prompt Injection
A recently identified vulnerability in Perplexity’s Comet AI browser has raised significant security concerns. This flaw allows attackers to inject malicious prompts through seemingly harmless […]
SpaceX Deactivates Over 2,500 Starlink Terminals Linked to Scam Operations in Myanmar
In a decisive move to prevent the misuse of its technology, SpaceX has deactivated more than 2,500 Starlink satellite internet terminals associated with scam centers […]
Samsung Galaxy S25 Zero-Day Vulnerability Exploited to Activate Camera and Track Location
At the Pwn2Own Ireland 2025 cybersecurity competition, researchers Ben R. and Georgi G. from Interrupt Labs demonstrated a significant security flaw in the Samsung Galaxy […]