An ongoing phishing campaign is using fake versions of the department's G5 grant portal, taking advantage of political turmoil associated with the DoE's 1,400 layoffs.
Newly Appointed Advisory Group to Support NIS2 and CRA Implementation Across Europe Beginning Aug. 1, European Union Agency for Cybersecurity, ENISA, will launch a new Advisory Group composed of 26 independent experts to help guide the EU’s cybersecurity strategy through 2027. Their work will support the rollout of the NIS2 Directive and the Cyber Resilience Act.
Apple, US Took Hard Line Against British Demand The U.K. government is reportedly set to reverse course on requiring smartphone giant Apple to give police access to device data stored as backups in the California company's cloud service. "The Home Office is basically going to have to back down," a British official said.
Ball to Succeed Todd Wilkinson, Expand Digital Identity Strategy, Tech Integration Tony Ball, the incoming CEO of Entrust, plans to shift the company's digital identity strategy beyond onboarding to support full life cycle use cases. He also plans to expand Entrust's post-quantum efforts and streamline customer delivery under one platform.
Researchers Find Flaws in Tridium Niagara Framework Vulnerabilities in Honeywell smart building middleware could allow hackers to manipulate physical systems or disable security alarms, warn security researchers. Hackers would already need access to the network. An attack would also depend on the Tridium Niagara customer not encrypting Syslog data.
A vulnerability has been found in CommScope Ruckus Unleashed and Ruckus ZoneDirector and classified as critical. Affected by this vulnerability is an unknown functionality of the component FTP. The manipulation leads to hard-coded credentials.
This vulnerability is known as CVE-2025-46118. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in LibreNMS up to 25.6.x. It has been declared as problematic. This vulnerability affects unknown code of the file ajax_form.php. The manipulation of the argument Type leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability was named CVE-2025-54138. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the component eBPF. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2023-39191. The attack can only be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Genshin Albedo Cat House App 1.0.2 on Android. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.house.auscat. The manipulation leads to improper export of android application components.
This vulnerability is known as CVE-2025-7940. Local access is required to approach this attack. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in pyLoad 0.5.0b3.dev89. Affected by this vulnerability is an unknown functionality of the file /json/upload of the component Uploaded File Name Handler. The manipulation leads to path traversal.
This vulnerability is known as CVE-2025-54140. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
The newly launched security startup provides an engineering relationship management platform that provides enterprises with visibility across code, infrastructure, and tools.
A vulnerability, which was classified as critical, was found in Fortinet FortiOS and FortiProxy. Affected is an unknown function of the component SSL VPN Webmode. The manipulation leads to uninitialized resource.
This vulnerability is traded as CVE-2023-37930. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Fortinet FortiAnalyzer and FortiManager. Affected by this vulnerability is an unknown functionality of the component Login Handler. The manipulation leads to improper output neutralization for logs.
This vulnerability is known as CVE-2024-52962. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Fortinet FortiIsolator up to 2.4.6. Affected by this issue is some unknown functionality of the component HTTP Request Handler. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2024-54024. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Fortinet FortiIsolator up to 2.4.6. This affects an unknown part of the component CLI Request Handler. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-54025. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fortinet FortiSwitch and classified as critical. Affected by this issue is the function set_password of the component GUI. The manipulation leads to unverified password change.
This vulnerability is handled as CVE-2024-48887. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.