CVEFeed Newsroom – Latest Cybersecurity Updates

The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.

  • Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fake ChatGPT Desktop App Delivering PipeMagic Backdoor, Microsoft

Microsoft warns that a fake ChatGPT desktop app was used to deliver PipeMagic malware, linked to ransomware attacks exploiting a Windows zero-day. Cybersecurity researchers at Microsoft discovered a n ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • BleepingComputer
Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week. N-central is a popular platform used by many managed serv ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • The Hacker News
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have lifted the lid on the threat actors' exploitation of a now-patched security flaw in Microsoft Windows to dep ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • TheCyberThrone
Cisco FMC and FTD Vulnerabilities

August 18, 2025CISCO FMC VulnerabilityCVE-2025-20265 (CVSS 10.0)Description: Remote code execution (RCE) vulnerability in the RADIUS authentication subsystem of FMC. Exploitable remotely and unauthent ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • CybersecurityNews
APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures

APT SideWinder, also known as Rattlesnake, Razor Tiger, and T-APT-04, is a nation-state advanced persistent threat (APT) group active since at least 2012 and believed to originate from India. Noted fo ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • security.nl
Trend Micro dicht actief aangevallen kwetsbaarheid in Apex One-platform

Trend Micro heeft een actief aangevallen kwetsbaarheid in endpoint security platform Apex One gedicht. Het securitybedrijf kwam op 5 augustus al met een waarschuwing voor het probleem, aangeduid als C ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • CybersecurityNews
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities

Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers are vulnerable to two newly disclosed zero-day vulnerabilities – CVE-2025-8875 and CVE-2025-8876. As of ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • VMRay
July 2025 Detection Highlights: 7 New VMRay Threat Identifiers, Config Extractors for 4 malware families, and 35+ fresh YARA rules.

The Labs team at VMRay actively gathers publicly available data to identify any noteworthy malware developments that demand immediate attention. We complement this effort with our internal tracking an ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • CybersecurityNews
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industria ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)
  • CybersecurityNews
What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe language ... Read more

Published Date: Aug 18, 2025 (4 weeks, 1 day ago)

Filters

Showing 10 of 8215 Results