The Linux 6.15 kernel, released on May 25, 2025, marks a pivotal moment in open-source development, introducing several groundbreaking features and technical advancements. Most notably, […]
Open MPIC project defends against BGP attacks on certificate validation
Border Gateway Protocol (BGP) hijacking has long represented a critical vulnerability in the internet’s infrastructure, allowing attackers to silently redirect traffic between endpoints. The risk […]
Bitwarden Flaw Allows Upload of Malicious PDFs, Posing Security Risk
A serious security vulnerability has been identified in Bitwarden, the popular password management platform, affecting versions up to 2.25.1. The flaw, designated CVE-2025-5138, allows attackers […]
Privilege Escalation Flaws Found in Tenable Network Monitor
Tenable has released version 6.5.1 of its Network Monitor, a key passive vulnerability scanning solution, to address several high-severity vulnerabilities discovered in both its codebase […]
The 7 unwritten rules of leading through crisis
Virtually all enterprises have some form of crisis management plan in place. Yet simply creating a crisis management program isn’t enough. What’s often more important […]
BSI warnt vor Cyberattacken auf Energieversorgung
Die BSI-Präsidentin Claudia Plattner fordert einen besseren IT-Schutz für die Energieversorgung in Deutschland. elxeneize – shutterstock.com Die Energieversorgung in Deutschland braucht aus Sicht der Präsidentin […]
Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use
A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide range of WSO2 products. The flaw, rated with a CVSS score […]
Apache Tomcat RCE Vulnerability Exposed with PoC Released
A critical security vulnerability, tracked as CVE-2025-24813, has been discovered in Apache Tomcat, a widely used open-source Java servlet container and web server. This flaw, […]
Sieben gängige Wege, ein Smartphone zu hacken
Angriffsvektoren gibt es etliche, doch wenn der Mensch aufpasst, lassen sich viele neutralisieren. Tero Vesalainen – shutterstock.com Mobiltelefone gelten gemeinhin zwar als sicherer als PCs, […]
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos […]