Request for Information Is Part of a Broader Medicare, Medicaid Fraud 'Crackdown' The U.S. Department of Health and Human Services will use "advanced" AI tools to more quickly detect Medicare and Medicaid fraud before scam claims are paid. As part of the "major crackdown" on healthcare fraud, HHS is also seeking public input on AI as regulators ponder potential rulemaking.
New Plugins Push AI Beyond Coding Deeper Into Enterprise Workflows Anthropic's announcement this week that it has launched more Claude Cowork plugins to tackle enterprise workflows is just the latest advancement in the artificial intelligence company's rollout of features aimed at upending the way companies do work.
Analysts Warn Pentagon Feud With Anthropic Could Trigger Cascading Defense Impacts Defense Secretary Pete Hegseth's ultimatum to Anthropic over expanded Claude access could trigger a months-long AI capability gap and disrupt the defense industrial base, as analysts warn that supply chain risk designations and compelled safeguards may destabilize national security AI strategy.
84,000+ scanning sessions targeting SonicWall SonicOS infrastructure in four days. GreyNoise details a coordinated reconnaissance campaign using rotating proxy infrastructure.
Currently trending CVE - Hype Score: 2 - A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.
Currently trending CVE - Hype Score: 3 - A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.
This issue requires administrative ...
Currently trending CVE - Hype Score: 2 - The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the ...
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.3. This affects the function gmap_helper_zap_one_page of the component KVM. This manipulation causes memory corruption.
This vulnerability appears as CVE-2025-71155. The attacker needs to be present on the local network. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.18.5. It has been classified as critical. Affected by this issue is some unknown functionality of the component gpio. Performing a manipulation results in denial of service.
This vulnerability is known as CVE-2025-71158. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Linux Kernel up to 6.6.119/6.12.63/6.18.2/6.19-rc2. Affected by this vulnerability is the function smb3_reconfigure of the component cifs. The manipulation leads to memory leak.
This vulnerability is documented as CVE-2025-71151. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.18.3/6.19-rc3. This vulnerability affects the function of_find_net_device_by_node of the component Conduit Driver. Such manipulation leads to improper update of reference count.
This vulnerability is traded as CVE-2025-71152. Access to the local network is required for this attack to succeed. There is no exploit available.
You should upgrade the affected component.
A vulnerability classified as critical was found in Linux Kernel up to 6.1.159/6.6.119/6.12.63/6.18.2/6.19-rc1. Affected by this issue is some unknown functionality of the component ksmbd. The manipulation results in improper update of reference count.
This vulnerability is reported as CVE-2025-71150. The attacker must have access to the local network to execute the attack. No exploit exists.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Linux Kernel up to 6.6.119/6.12.63/6.18.3/6.19-rc3. This impacts the function get_file_all_info of the component ksmbd. Performing a manipulation results in memory leak.
This vulnerability is cataloged as CVE-2025-71153. The attack must originate from the local network. There is no exploit available.
It is suggested to upgrade the affected component.