Cybersecurity
-
China Exploited New VMware Bug for Nearly a Year
Source: Dark ReadingRead more: China Exploited New VMware Bug for Nearly a YearResearchers have identified a privilege-escalation bug in VMware that has been exploited by attackers. This vulnerability has been present in…
-
Watchdog: Cyber threat information-sharing program’s future uncertain with expected expiration of 2015 law
Source: CyberScoopRead more: Watchdog: Cyber threat information-sharing program’s future uncertain with expected expiration of 2015 lawThe future of the Cybersecurity Information Sharing Act (CISA) is in jeopardy as it approaches expiration. A DHS inspector general…
-
Nearly 50,000 Cisco firewalls vulnerable to actively exploited flaws
Source: BleepingComputerRead more: Nearly 50,000 Cisco firewalls vulnerable to actively exploited flawsApproximately 50,000 Cisco ASA and FTD appliances are exposed to the public internet and are vulnerable to two actively exploited…
-
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware
Source: The Hacker NewsRead more: Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth MalwareA newly identified state-sponsored hacking group known as Phantom Taurus has been linked to China and is targeting government and…
-
Anthropic touts safety, security improvements in Claude Sonnet 4.5
Source: CyberScoopRead more: Anthropic touts safety, security improvements in Claude Sonnet 4.5Anthropic has announced enhancements in the safety and security measures of its AI model, Claude Sonnet 4.5. The company’s research…
-
Critical WD My Cloud bug allows remote command injection
Source: BleepingComputerRead more: Critical WD My Cloud bug allows remote command injectionWestern Digital has issued firmware updates for various My Cloud NAS models to address a serious vulnerability. This flaw enables…
-
Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results
Source: SecurityWeekRead more: Google Patches Gemini AI Hacks Involving Poisoned Logs, Search ResultsGoogle has addressed vulnerabilities in its Gemini AI that allowed it to be manipulated into aiding sensitive data theft. Researchers…
-
Chinese hackers exploiting VMware zero-day since October 2024
Source: BleepingComputerRead more: Chinese hackers exploiting VMware zero-day since October 2024A serious privilege escalation vulnerability in VMware Aria Operations and VMware Tools has been under active exploitation since October 2024.…
-
VMware Certification Is Surging in a Shifting IT Landscape
Source: BleepingComputerRead more: VMware Certification Is Surging in a Shifting IT LandscapeVMware certification is experiencing a significant increase as IT teams navigate hybrid infrastructures and cloud complexities. The VMware User Group…
-
Microsoft fixes Windows DRM video playback issues for some users
Source: BleepingComputerRead more: Microsoft fixes Windows DRM video playback issues for some usersMicrosoft has announced a partial resolution to the DRM video playback issues affecting Blu-ray, DVD, and Digital TV applications. This…






