Cybersecurity
-
Undocumented Radios Found in Solar-Powered Devices
Source: Dark ReadingRead more: Undocumented Radios Found in Solar-Powered DevicesThe US Transportation Department has issued a warning regarding the presence of undocumented radios in solar-powered devices utilized in highway…
-
CISA: CVE Program to Focus on Vulnerability Data Quality
Source: SecurityWeekRead more: CISA: CVE Program to Focus on Vulnerability Data QualityCISA is prioritizing improvements in the CVE Program with a focus on enhancing the quality of vulnerability data. This initiative…
-
VMScape: Academics Break Cloud Isolation With New Spectre Attack
Source: SecurityWeekRead more: VMScape: Academics Break Cloud Isolation With New Spectre AttackA new Spectre attack called VMScape allows academics to exploit vulnerabilities in cloud isolation. This exploit extends to leaking arbitrary…
-
Samsung patches actively exploited zero-day reported by WhatsApp
Source: BleepingComputerRead more: Samsung patches actively exploited zero-day reported by WhatsAppSamsung has issued a patch for a remote code execution vulnerability affecting its Android devices. This flaw was reportedly exploited…
-
Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm
Source: SecurityWeekRead more: Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security FirmKioSoft has faced criticism for taking over a year to address a serious NFC card vulnerability. The security flaw, identified…
-
Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage
Source: The Hacker NewsRead more: Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center StageThe security landscape for cloud-native applications is rapidly evolving as enterprises increasingly adopt technologies like containers and Kubernetes. Traditional security…
-
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
Source: The Hacker NewsRead more: Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious RepositoriesA security vulnerability in the Cursor code editor could allow malicious code execution when opening compromised repositories. The flaw is…
-
CISA work not ‘degraded’ by Trump administration cuts, top agency official says
Source: CyberScoopRead more: CISA work not ‘degraded’ by Trump administration cuts, top agency official saysNick Andersen defended CISA’s capabilities in light of budget cuts imposed during the Trump administration. He rebutted criticisms from various…
-
Meta ignored child sex abuse in VR, say whistleblowers
Source: Malware BytesRead more: Meta ignored child sex abuse in VR, say whistleblowersTwo former Meta employees have made serious allegations about the company’s handling of child abuse risks within its virtual reality…
-
Microsoft investigates Exchange Online outage in North America
Source: BleepingComputerRead more: Microsoft investigates Exchange Online outage in North AmericaMicrosoft is addressing a significant outage impacting Exchange Online users across North America, which is hindering email access. The company…








