A vulnerability marked as critical has been reported in Apple macOS. This affects an unknown function of the component Web Handler. The manipulation leads to memory corruption.
This vulnerability is documented as CVE-2025-43213. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Apple Safari and classified as critical. This affects an unknown part of the component Web Handler. The manipulation results in memory corruption.
This vulnerability was named CVE-2025-31223. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in Metabase up to 1.59.3. This affects an unknown function of the file /api/ee/serialization/import of the component Serialization Import Endpoint. The manipulation results in deserialization.
This vulnerability is known as CVE-2026-33725. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability labeled as critical has been found in Delta Electronics COMMGR2 up to 2.11.0. This affects an unknown function. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is handled as CVE-2026-3630. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in gdk-pixbuf. It has been rated as critical. Affected by this issue is some unknown functionality of the component JPEG Image Loader. Performing a manipulation results in heap-based buffer overflow.
This vulnerability was named CVE-2026-5201. The attack may be initiated remotely. There is no available exploit.
A vulnerability identified as critical has been detected in OpenStack Glance up to 29.1.0/30.1.0/31.0.0. Affected by this vulnerability is an unknown functionality of the component ovf_process Image Import Plugin. Performing a manipulation results in server-side request forgery.
This vulnerability is identified as CVE-2026-34881. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
Why Remote Access to Industrial Operations Is the Biggest Unmanaged Risk Remote access has become one of the largest unmanaged attack surfaces in industrial operations. Legacy VPNs and jump servers expose OT environments to serious risk. Learn how Cisco Cyber Vision's Secure Equipment Access can secure vendor and engineer access while protecting critical infrastructure.
A Disorienting Future: Rapid Pace of Change and AI Agents in the Hands of Attackers Reflecting the current state of cybersecurity, uncertainty dominated at this year's annual RSAC Conference in San Francisco, as advances in artificial intelligence, including agentic artificial intelligence, now pose risks experts never saw coming. It's a disorientating state of affairs for all involved.
AI is accelerating cyberattacks faster than organizations can prioritize them, forcing security leaders to rethink how they define and defend against “emerging threats.” Most modern threats aren’t new, just amplified by AI, says Akamai's Brent Maynard.
UK NCSC's Richard Horne on Strengthening Cyber Defense and Incident Response Cyber risk is rising as digital dependence grows and threat actors expand. NCSC CEO Richard Horne outlines why leaders must treat cybersecurity as mission-critical, strengthen their resilience, and align defense efforts to counter ransomware, AI-driven threats, and supply chain attacks.
TriMed Is Among Several Other Medical Device Firms Recently Attacked A California maker of implantable orthopedic gear is the latest medical device maker in recent weeks to disclose it's been a victim of a cybersecurity incident. The disclosure of the hack on TriMed comes on the heels of an Iranian hacktivist attack on Stryker and a data theft from UFP Technologies.
Founder and CEO Eric Foster Wants to Reduce Dwell Time and Scale Engineering Teams Tenex plans to use its $250 million Series B funding to expand its AI-driven SOC platform and hire hundreds of engineers. The company aims to improve alert coverage, automate response and reduce attacker dwell time while maintaining human oversight for complex threats.
Analysts Warn Compliance Goals May Outpace Real Security Outcomes The Pentagon's zero trust overhaul aims to unify cyber defenses, but with a small percentage of target activities reportedly complete, persistent gaps in identity, data and governance are raising doubts about whether the 2027 deadline will deliver real security gains.
Proton has announced a new video conferencing service named Meet and positioned it as a privacy-focused alternative to mainstream services like Google Meet, Zoom, and Microsoft Teams. [...]
The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable hosts. [...]
Anthropic accidentally exposed Claude Code source via npm, causing the code to quickly spread online after discovery. Anthropic accidentally leaked the source code of its Claude Code tool after a large debug file was included in a public npm release. The file exposed over 500,000 lines of code, which were quickly discovered, shared, and analyzed […]