Recent advisories from U.S. federal authorities on vulnerabilities in certain operational technology devices underscore the potential security risks that many healthcare providers frequently underestimate, said Sila Özeren, a security research engineer at Picus Security.
Schellman CEO Avani Desai on Balancing Innovation and Compliance in Uncertain Market The Trump administration’s AI action plan signals a major deregulatory shift, setting up a patchwork of state regulations on AI deployments. Company policies must be “flexible enough to meet the strictest state without rewriting them every few months," said Avani Desai, CEO, Schellman.
Space Policy and Tech Head Paul Liias on Dealing With Satellite Vulnerabilities A major disruption of civil and military satellites could cause chaos on the ground to communications, navigation and other vital services. But the threats don't just come from missiles. They also comes from hackers who could exploit numerous vulnerabilities, said Estonia's Paul Liias.
Cyfinoid's Shrivastava Calls for Greater Visibility Over Software Security Risks Software supply chain security is all too often viewed through a narrow lens, focused mostly on code dependencies and Software Bill of Materials. But the devil remains in the details and risks can emerge from overlooked areas, said Anant Shrivastava, founder and chief researcher at Cyfinoid.
Researchers Say AI Bots Blur Lines Between Identity, Consent and Cyber Defense As generative AI programs continue to evolve, they are introducing new threats to the modern workplace. Digital twins, once confined to industrial systems, now enable hyper-realistic copies of actual employees to mimic vocal patterns, behaviors and even pick up on decision-making trends.
A vulnerability was found in Siemens SINEC Traffic Analyzer up to 2.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-40768. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ivanti Avalanche and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2025-8296. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Ivanti Avalanche. Affected by this issue is some unknown functionality of the component Configuration Handler. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2025-8297. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Microsoft Edge on Android. This vulnerability affects unknown code. The manipulation leads to the ui performs the wrong action.
This vulnerability was named CVE-2025-49736. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Dynamics 365 and classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-49745. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Edge on Android. It has been classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to clickjacking.
This vulnerability is handled as CVE-2025-49755. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft SharePoint Enterprise Server. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2025-49712. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability labeled as problematic has been found in Oracle MySQL Server up to 8.0.41/8.4.4/9.2.0. This issue affects some unknown processing of the component Replication. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2025-30683. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Oracle MySQL Server up to 8.0.41/8.4.4/9.2.0. Affected by this vulnerability is an unknown functionality of the component Replication. The manipulation leads to denial of service.
This vulnerability is known as CVE-2025-30684. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Oracle MySQL Server up to 8.0.41/8.4.4/9.2.0. Affected by this issue is some unknown functionality of the component Replication. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2025-30685. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.