Researcher Says Patched Commvault Bug Still Exploitable – Dark Reading
CISA added CVE-2025-34028 to its catalog of known exploited vulnerabilities, citing active attacks in the wild. – Read More
CISA added CVE-2025-34028 to its catalog of known exploited vulnerabilities, citing active attacks in the wild. – Read More
The vulnerability, which has a CVSS score of 9.8, is under attack and allows threat actors to remotely execute arbitrary commands on servers running the agentic AI builder. – Read…
The vulnerabilities affect SonicWall’s SMA devices for secure remote access, which have been heavily targeted by threat actors in the past. – Read More
As attacks accelerate, security leaders must act to gain visibility across their entire institution’s network and systems and continuously educate their users on best practices. – Read More
Documented in a series of social media posts, cybersecurity experts shared with Dark Reading their insights on RSAC 2025 throughout the week. – Read More
Researchers from Arctic Wolf Labs detailed a new spear-phishing campaign that targets hiring managers and recruiters by posing as a job seeker. – Read More
While passkeys offer enhanced security against phishing and credential theft, implementation hurdles, cross-platform inconsistencies, and user experience challenges pose significant barriers to widespread adoption. – Read More
Industry experts at RSAC 2025 call for urgent accountability in addressing technology’s negative impact on youth, highlighting concerns about Internet anonymity, mental health, and the growing disconnect between generations. –…
After stealing sensitive data from Disney, Ryan Mitchell Kramer claimed to be part of a Russian hacktivist group protecting artists’ rights and ensuring they receive fair compensation for their work.…
When designed with strong governance principles, AI can drive innovation while maintaining the people’s trust and security. – Read More
A series of cyberattacks have struck multiple major British retailers in recent weeks, and a ransomware gang has reportedly claimed responsibility. – Read More
Starting this month, finance companies operating in New York must implement a variety of protections against unauthorized access to IT systems. – Read More
Software teams need to follow security best practices to eliminate the leak of secrets, as threat actors increase their scanning for configuration and repository files. – Read More
While law enforcement has identified and arrested several alleged members, the notorious threat group continues to wreak havoc. – Read More
Gutting CISA won’t just lose us a partner. It will lose us momentum. And in this game, that’s when things break. – Read More