Search results for: “network security”
-

YouTube Ghost Network Leverages Deceptive Tactics for Widespread Malware Distribution
A sophisticated and coordinated malware distribution operation, dubbed the “YouTube Ghost Network” by Check Point Research, has been actively exploiting YouTube’s features to promote malicious content and distribute information-stealing malware.
-

Cybersecurity Overhaul: Thales and Imperva Unite for Integrated Security
Thales and Imperva are combining forces to offer businesses a truly unified defense, from data protection to application security, integrating AI and machine learning for advanced threat detection and a stronger security posture.
-

F5 Networks breach: what we know about the October 2025 incident
F5 Networks said its engineering systems were breached in October 2025 and that attackers removed development materials including code and reports.
-

Critical Cisco Firewall Flaws Exploited for Denial-of-Service Attacks
Cisco firewalls are facing new denial-of-service attacks exploiting critical vulnerabilities, CVE-2025-20333 and CVE-2025-20362. These flaws in Cisco’s Secure Firewall ASA and FTD software allow attackers to gain control and force device reloads, disrupting network services. The ongoing exploitation highlights the urgent need for timely patching and continuous vigilance in network security.
-

Cisco Firepower Firewalls: Next-Gen Protection and Critical Vulnerabilities
This article examines Cisco Firepower Firewalls, detailing their next-generation protection capabilities and critical vulnerabilities. It highlights the importance of timely updates as warned by CISA for effective cybersecurity.
-

Unnamed APT Exploits Zero-Days in Citrix and Cisco, Targeting Critical Infrastructure
An unnamed advanced persistent threat (APT) group exploited zero-day vulnerabilities in Citrix NetScaler ADC and Gateway, dubbed “CitrixBleed 2,” and a critical flaw in Cisco Identity Service Engine (ISE). The attacks targeted essential identity and network access control infrastructure.
-

China Sells $13K Switchblade Drone Clone
A Chinese firm unveils a $13,000 loitering munition, a Switchblade clone, expanding global drone technology accessibility and redefining military strategies.
-

CVE-2025-8855: 2FA Bypass in Brokerage Automation
CVE-2025-8855 is a critical 2FA bypass vulnerability in Optimus Software’s Brokerage Automation platform. It combines authorization bypass, weak password recovery, and authentication bypass flaws, leading to high-severity risks and unauthorized access.
-

ShadowMQ Flaw Exposes AI Inference Engines to Remote Code Execution
Oligo Security found a recurring ZeroMQ/pickle deserialization flaw affecting multiple AI inference frameworks; several vendors have issued patches.
-

Fake AI and WhatsApp apps on third‑party Android stores hide spyware, ad fraud
Appknox warns that fake ChatGPT, DALL·E and WhatsApp apps on third‑party Android stores range from harmless wrappers to spyware that intercepts OTPs.