Critical Vulnerabilities in Ivanti Products Leave Enterprises Exposed to Remote Attacks

Critical Vulnerabilities in Ivanti Products Leave Enterprises Exposed to Remote Attacks Ivanti has released urgent patches addressing four high-severity vulnerabilities9 (CVE-2025-22457, CVE-2025-22467, CVE-2024-38657, and CVE-2024-10644)affecting its widely used Connect Secure (ICS), Policy Secure (IPS), and Secure Access Client (ISAC) products. These flaws open the door to remote code execution, unauthorized file manipulation, and command injection, […]

Apache Traffic Server Flaw Enables HTTP Request Smuggling Attacks

Apache Traffic Server Flaw Enables HTTP Request Smuggling Attacks A critical vulnerability in Apache Traffic Server (ATS) allows attackers to exploit the server’s handling of chunked messages to execute HTTP request smuggling attacks. Identified as CVE-2024-53868, this flaw can result in serious security threats, including firewall bypass, cache poisoning and session hijacking. The vulnerability affects […]

Apple Fixes Recent Zero-Days in Older Devices

Apple Fixes Recent Zero-Days in Older Devices Apple has released backported security patches for older versions of iOS, iPadOS, and macOS, addressing three zero-day vulnerabilities that have been exploited in targeted attacks. These flaws—impacting system authorization, WebKit, and Core Media—enabled privilege escalation and code execution during targeted attacks. Users with older devices are strongly encouraged […]

High-Severity Vulnerability in VMware Tools Allows Privilege Escalation

High-Severity Vulnerability in VMware Tools Allows Privilege Escalation A newly discovered high-severity vulnerability (CVE-2025-22230) in VMware Tools for Windows could allow attackers with limited access inside a virtual machine (VM) to escalate their privileges and execute high-privilege operations. Affecting VMware Tools versions 11.x.x and 12.x.x, this flaw has been assigned a CVSSv3 score of 7.8, […]

Surge in Real Estate Scams Across the Middle East

Surge in Real Estate Scams Across the Middle East A new wave of real estate scams has emerged across the Middle East, targeting individuals and businesses seeking to invest in property. Cybercriminals are using fake property listings, fraudulent investment schemes, and phishing attacks to deceive victims into transferring large sums of money. These scams are […]

Six Million Records Reportedly Stolen in Oracle Cloud Breach

Six Million Records Reportedly Stolen in Oracle Cloud Breach A threat actor known as “rose87168” claims to have breached Oracle Cloud’s authentication systems, allegedly exfiltrating six million records impacting over 140,000 tenants. The stolen data reportedly includes JKS files, encrypted SSO and LDAP passwords and JPS keys, with the attacker demanding payment for data removal. […]

High-Risk Junos OS Vulnerability Exposes Networks to Privilege Escalation Risks

High-Risk Junos OS Vulnerability Exposes Networks to Privilege Escalation Risks A critical vulnerability has been identified in the kernel of Juniper Networks’ Junos OS. This flaw arises from improper isolation or compartmentalization within the operating system, allowing a local attacker with high privileges and shell access to inject and execute arbitrary code. Notably, this vulnerability […]

Critical Apache Tomcat Vulnerability Enables Remote Code Execution

Critical Apache Tomcat Vulnerability Enables Remote Code Execution A critical security vulnerability affecting Apache Tomcat versions 9.0.0.M1 through 9.0.98, 10.1.0-M1 through 10.1.34, and 11.0.0-M1 through 11.0.2 has been identified. This flaw arises from improper handling of file paths containing internal dots, leading to potential remote code execution (RCE), information disclosure, or unauthorized content modification. Technical […]

Zoom Issues Urgent Patch for High-Risk Vulnerabilities

Zoom Issues Urgent Patch for High-Risk Vulnerabilities Recent security vulnerabilities in Zoom Workplace Apps and SDKs, including heap-based buffer overflow CVE-2025-27440, buffer underflow CVE-2025-27439, use-after-free CVE-2025-0151, and incorrect behavior order CVE-2025-0150, pose significant risks to users. These flaws could allow remote attackers to execute arbitrary code, escalate privileges, or cause denial-of-service (DoS) conditions. Zoom has […]

Type Confusion in V8 in Google Chrome Vulnerabilities

Type Confusion in V8 in Google Chrome Vulnerabilities Google Chrome has recently addressed two critical vulnerabilities, CVE-2025-1920 and CVE-2025-2135, both stemming from type confusion issues in the V8 JavaScript engine. These vulnerabilities could allow remote attackers to execute arbitrary code by tricking users into visiting specially crafted web pages. To mitigate these risks, users are […]