News

The Hong Kong Computer Emergency Response Team Coordination Center issued an alert regarding a remote code execution flaw in Google Chrome. The Chrome team reported the same vulnerability. The Chrome ...
CVE-2025-49457 in Zoom Clients exposes users to privilege escalation. Update Zoom to version 6.3.10 to mitigate risks.
Fortinet has urgently notified users of a critical OS command injection vulnerability in its FortiSIEM platform, identified as CVE-2025-25256, which ...
Microsoft has disclosed a serious vulnerability in its collaboration platform, Microsoft Teams, that could open the door to Remote Code Execution (RCE) attacks. The flaw, tracked as CVE-2025-53783, ...
Patch Tuesday August 2025 included fixes for 19 vulnerabilities rated 8.8 or higher, but only one of those is considered at high risk of exploitation.
CVE-2025-6543 in Citrix NetScaler exploited in stealth attacks on Dutch critical systems. NCSC urges deeper investigation beyond patching.
The Zelle lawsuit 2025 is making headlines as New York Attorney General Letitia James takes legal action against Early Warning Services (EWS), the creator of the popular digital payment platform. The ...
Earlier this year, WestJet revealed that some of its passengers were affected by a cyberattack that resulted in the theft of personal information. The WestJet data breach, which took place in June ...
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
IntelBroker Interview: The Elusive Hacker in the Shadows Talks to The Cyber Express IntelBroker's actions were initially thought to involve a skilled team exploiting vulnerabilities. However, an ...
U.S. Lawmakers Target ‘Adversarial AI’ in Bipartisan Push to Fortify Federal Systems Artificial intelligence controlled by foreign adversaries poses a direct threat to national security, data, and ...
Researchers Deep Dive into UNC3886 Actors’ Cyberespionage Realm UNC3886 has it all in its threat arsenal: rootkits, custom malware, leveraging trusted third-party services for C2, and installing SSH ...