Adversarial AI Attacks? Yes, your AI-powered security tools have a fatal flaw: they can be tricked. Attackers are now using adversarial machine learning to slip past your defences …
Latest in Vulnerabilities & Exploits
-
-
Vulnerabilities & ExploitsNews & Resources
Exploited Ivanti VPN Vulnerability Puts Over 5,000 Devices at Risk of Remote Attacks
by Clement Brako Akomea 2 minutes readA newly revealed exploited Ivanti VPN vulnerability is putting over 5,000 internet-facing devices at serious risk, with evidence pointing to an active campaign by a sophisticated Chinese threat …
-
Vulnerabilities & ExploitsNews & Resources
Google Android Vulnerabilities Patched: 40+ Exploited Flaws Fixed in March 2025 Update
by Clement Brako Akomea 3 minutes readThe recent fixes for Google Android Vulnerabilities in the March 2025 update, detailed on Android’s official security bulletin, address over 40 vulnerabilities, including two actively exploited in the …
-
Vulnerabilities & ExploitsNews & Resources
Palo Alto Firewall Vulnerability CVE-2025-0108 Exploited in the Wild
by Penelope Iroko 2 minutes readA critical Palo Alto Firewall Vulnerability has been confirmed to be under active exploitation. The security flaw tracked as CVE-2025-0108, allows unauthorized attackers to gain access to the …
-
News & ResourcesVulnerabilities & Exploits
Microsoft Fixes Critical Windows Zero-Day Vulnerabilities in February Patch Update
by Penelope Iroko 2 minutes readMicrosoft has rolled out its latest Patch Tuesday security update, fixing multiple vulnerabilities, including two actively exploited zero-day vulnerabilities. The company has urged Windows users and administrators to …
-
Vulnerabilities & ExploitsNews & Resources
Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack
by CSC Newsby CSC News 2 minutes readApple has confirmed that an ‘extremely sophisticated’ Apple USB Restricted Mode exploit has been used in targeted attacks, potentially putting iPhone and iPad users at risk. Apple Issues …
-
News & ResourcesVulnerabilities & Exploits
MintsLoader Cyber Attacks Delivers StealC Malware and BOINC in Attacks
by Clement Brako Akomea 2 minutes readThe rise of MintsLoader cyber attacks highlights a growing threat in the digital landscape, targeting industries like energy and legal services. Recently identified by cybersecurity firm eSentire, this …
-
News & ResourcesVulnerabilities & Exploits
Meta Llama Framework Vulnerability Exposes Remote Code Execution Risks
by Penelope Iroko 2 minutes readA significant Meta Llama framework vulnerability has been uncovered, threatening the safety of artificial intelligence (AI) systems. Meta Llama Framework Vulnerability Sparks AI Security Concerns This flaw, identified …
-
Vulnerabilities & ExploitsNews & Resources
Subaru Starlink Vulnerability Exposed Cars to Remote Hacking
by Penelope Iroko 2 minutes readThe Subaru Starlink vulnerability recently made headlines for exposing millions of vehicles to potential remote hacking. This shocking security gap in Subaru’s connected car system, Starlink, left vehicles …
-
Vulnerabilities & ExploitsNews & Resources
CISA Adds New Exploited jQuery Vulnerability to KEV Catalog
by CSC Newsby CSC News 2 minutes readThe CISA known exploited vulnerabilities update has just included a critical jQuery vulnerability cross-site scripting (XSS) flaw, tracked as CVE-2020-11023, to its catalog. This latest addition highlights the …