Summary: Fortinet has disclosed a critical buffer underwrite vulnerability (CVE-2023-25610) affecting multiple versions of FortiOS and FortiProxy,...
Red-Team
A severe security flaw in Next.js, tracked as CVE-2025-29927, allows attackers to bypass authentication and authorization checks...
Microsoft has recently addressed a series of critical vulnerabilities in its Windows operating system, as highlighted in...
Microsoft has recently addressed several critical vulnerabilities in its Azure platform, as reported by the Dutch National...
Fortinet has recently addressed a critical vulnerability affecting multiple products, including FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb....
Adobe has recently addressed critical vulnerabilities in Adobe Acrobat Reader, as highlighted in the NCSC-2025-0084 advisory. These...
On March 12, 2025, Ivanti announced the resolution of a critical vulnerability in its Ivanti Secure Access...
Autodesk has recently addressed multiple vulnerabilities in its AutoCAD software, a critical tool used by architects, engineers,...
Apache Tomcat, a widely used open-source Java servlet container, has recently addressed a critical vulnerability that could...
Synology has recently addressed a critical vulnerability in its Synology Replication Service and Synology Unified Controller, which...
Synology has recently addressed a critical vulnerability in its DiskStation Manager (DSM) software, specifically within its LDAP...
IBM has recently addressed a critical vulnerability in its IBM InfoSphere Information Server 11.7, as detailed in...
A critical vulnerability (CVE-2025-23120) in Veeam Backup & Replication has been addressed by the vendor. The flaw,...
The Dutch National Cyber Security Centre (NCSC) has recently observed active exploitation of a critical vulnerability in...
The Nationaal Cyber Security Centrum (NCSC) of the Netherlands has issued a warning regarding a series of cyberattacks...
Ransomware attacks continue to be a significant threat to organizations worldwide, but many of these incidents can...
The National Cyber Security Centre (NCSC) has reported a significant surge in ransomware attacks targeting critical vulnerabilities...
TL;DR Malicious macros remain a significant threat, with Microsoft Office being a common attack vector. Updated guidance...
In today’s rapidly evolving cybersecurity landscape, vulnerability scanning has become a cornerstone of effective security management. With...
In today’s interconnected world, the lifecycle of network devices—from acquisition to disposal—plays a critical role in maintaining...