A serious security vulnerability has been identified in Bitwarden, the popular password management platform, affecting versions up to 2.25.1. The flaw, designated CVE-2025-5138, allows attackers […]
Author: cyberbytes
Privilege Escalation Flaws Found in Tenable Network Monitor
Tenable has released version 6.5.1 of its Network Monitor, a key passive vulnerability scanning solution, to address several high-severity vulnerabilities discovered in both its codebase […]
The 7 unwritten rules of leading through crisis
Virtually all enterprises have some form of crisis management plan in place. Yet simply creating a crisis management program isn’t enough. What’s often more important […]
BSI warnt vor Cyberattacken auf Energieversorgung
Die BSI-Präsidentin Claudia Plattner fordert einen besseren IT-Schutz für die Energieversorgung in Deutschland. elxeneize – shutterstock.com Die Energieversorgung in Deutschland braucht aus Sicht der Präsidentin […]
Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use
A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide range of WSO2 products. The flaw, rated with a CVSS score […]
Apache Tomcat RCE Vulnerability Exposed with PoC Released
A critical security vulnerability, tracked as CVE-2025-24813, has been discovered in Apache Tomcat, a widely used open-source Java servlet container and web server. This flaw, […]
Sieben gängige Wege, ein Smartphone zu hacken
Angriffsvektoren gibt es etliche, doch wenn der Mensch aufpasst, lassen sich viele neutralisieren. Tero Vesalainen – shutterstock.com Mobiltelefone gelten gemeinhin zwar als sicherer als PCs, […]
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos […]
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. “The ClickFix technique […]
How AI Is Transforming SASE, Zero Trust for Modern Enterprises
By automating security policies and threat detection while coaching users on data protection, companies will be better able to take control of and protect their […]