ABB’s medium voltage (MV) drives, widely used in industrial automation and critical infrastructure, have been found to...
Enterprise Security
Microsoft has released the optional KB5055612 preview cumulative update for Windows 10 22H2, addressing a critical GPU...
Google has introduced a new safety feature in its Messages app designed to combat unsolicited nude images...
Microsoft has reached a significant milestone in its cybersecurity strategy, reporting a 92% adoption rate of phishing-resistant...
The rise of quantum computing has forced the cybersecurity community to confront a new reality: traditional encryption...
Display interfaces like HDMI, DVI, and DisplayPort contain overlooked attack surfaces that security professionals should understand. Research...
Microsoft has confirmed that a recent wave of Entra ID (formerly Azure AD) account lockouts stemmed from...
In a sophisticated phishing campaign, attackers exploited Google’s OAuth infrastructure and DKIM email authentication to send fraudulent...
Behavioral Health Resources (BHR) of Washington state has updated its data breach disclosure, revealing a significant escalation...
The UK’s Investigatory Powers Tribunal has ruled that the legal dispute between Apple and the UK government...
A former pharmacist at the University of Maryland Medical Center (UMMC) allegedly installed keyloggers on over 400...
On March 28, 2025, China’s Cyberspace Administration issued draft amendments to the country’s Cybersecurity Law, marking a...
The UK government has unveiled the full scope of its Cyber Security and Resilience Bill, set to...
As the Department of Health and Human Services (HHS) undergoes mass layoffs, lawmakers and cybersecurity experts warn...
A security flaw in Verizon’s Call Filter API allowed unauthorized access to customers’ incoming call histories due...
Organizations facing increasingly sophisticated cyber threats are turning to platformization—the integration of security, development, and cloud operations—to...
In an era where data drives business operations, the loss of critical information can cripple organizations. World...
Recent reports of a Chinese deep-sea electromagnetic device capable of disrupting global communications and energy networks have...
AssetView Vulnerability Exposes Systems to Unauthenticated File Access and Deletion (CVE-2025-25060)

AssetView Vulnerability Exposes Systems to Unauthenticated File Access and Deletion (CVE-2025-25060)
A critical vulnerability in AssetView and AssetView CLOUD (CVE-2025-25060) has been disclosed, allowing unauthenticated attackers to access...
Google has begun rolling out a new end-to-end encryption (E2EE) feature for Gmail enterprise users, streamlining secure...