PoC Released for Fortinet Vulnerability CVE-2025-3275

FortinGuard Labs issued an advisory for CVE-2025-32756, a critical vulnerability affecting multiple Fortinet products. Just a day later, CVE-2025-32756 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. Today researchers at Horizon3.ai released a proof-of-concept (PoC) demonstrating exploitation of the vulnerability. Their analysis focused on comparing the patched and unpatched versions of FortiMail. CVE-2025-32756 According to … Continued

Cisco Discloses Critical RADIUS Vulnerability CVE-2025-20152 in Identity Services Engine

Cisco has issued a high-severity security advisory for a vulnerability affecting its Identity Services Engine (ISE), warning that the flaw could allow unauthenticated remote attackers to trigger a denial of service (DoS) condition on affected devices. CVE-2025-20152 The vulnerability, tracked as CVE-2025-20152, stems from improper handling of certain RADIUS authentication requests within Cisco ISE, a widely … Continued

New backdoor malware exploits PyBitmessage P2P protocol

The AhnLab Security Intelligence Center (ASEC) has discovered a new backdoor malware strain bundled with a Monero cryptocurrency miner. Unlike other malware that uses HTTP or IP-based communication, this malware uses PyBitmessage library to communicate over a peer-to-peer (P2P) network, encrypting its traffic between endpoints. What is PyBitmessage? Bitmessage is a protocol designed for anonymity … Continued

Lexmark Issues Security Advisory for Critical Vulnerability

Lexmark, a global provider of printing and imaging products, has issued a critical security advisory warning of a severe vulnerability affecting the embedded web servers in multiple Lexmark devices.  The vulnerability is a combination of Path Traversal and Concurrent Execution flaws, which could allow attackers to execute arbitrary code remote execution. Vulnerability Details The vulnerability, … Continued

VanHelsing Ransomware Source Code Leaked

Yesterday morning, out of the blue, the notorious VanHelsing ransomware source code was suddenly listed for sale on the RAMP cybercrime forum. This unexpected leak has quickly caught the attention of cybersecurity researchers and threat intelligence analysts, raising concerns about the potential misuse of the code and what it could mean for the organizations. Initial … Continued

Critical CVE-2025-4322 vulnerability in Motors Theme Allows Admin Takeover

A severe security vulnerability has been identified in the premium WordPress theme Motors, potentially allowing unauthenticated attackers to hijack administrator accounts and seize full control of affected websites. CVE-2025-4322 The vulnerability, tracked as CVE-2025-4322, was publicly disclosed today by security firm Wordfence and has been assigned a CVSS severity rating of 9.8, classifying it as … Continued

Security Researcher Uncovers SVG Rendering Flaw (CVE-2025-43714) in ChatGPT

In a recent experiment with OpenAI’s ChatGPT, a security researcher uncovered a potentially serious vulnerability(CVE-2025-43714) involving the way the chatbot handles and renders SVG and image tags within code blocks. The flaw, which has since been reported to OpenAI and partially mitigated, raised concerns around stored cross-site scripting (XSS) and phishing vectors. The issue emerged when … Continued

U.K. Legal Aid Agency hit by major data breach

A cyberattack on the U.K.’s Legal Aid Agency(LAA) has compromised a vast trove of personal and financial data dating back to 2010, the government confirmed, raising concerns over the safety of thousands of legal aid applicants. What Happened On April 23, officials discovered a cyberattack on the agency’s online portal used by legal aid providers … Continued

Inside the TM SGNL Hack That Embarrassed the White House

After Trump’s NSA Mike Waltz was photographed using the TM SGNL app during a cabinet meeting, the incident set off alarm bells across the global cybersecurity community. Hackers and threat actors scrambled to uncover potential zero-day vulnerabilities in the app. Meanwhile, security researcher Micah Lee began publishing a series of explosive reports that gradually led … Continued

Newsletter line