The assessment said Chinese security and intelligence services have strengthened their ability to operate in Norway, including through cyber operations and human intelligence collection.
Security teams aren’t drowning because the threats improved. They’re drowning because the visibility got worse. The October 2025 commissioned Forrester Consulting study conducted on behalf of NETSCOUT surfaces a problem that every analyst already knows: 61% of survey respondents say their analysts spend more than ten...
The European Commission said today that TikTok is facing a fine because its addictive features, including infinite scroll, autoplay, push notifications, and personalized recommendation systems, are breaching the EU's Digital Services Act (DSA). [...]
A vulnerability was found in Axigen Mail Server up to 10.5.56. It has been rated as critical. Affected is an unknown function of the component WebAdmin Interface. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-68721. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability, which was classified as critical, was found in o6 Automation Open62541 up to 1.5-rc1. This impacts an unknown function of the component JSON Handler. Executing a manipulation can lead to out-of-bounds write.
The identification of this vulnerability is CVE-2026-1301. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability marked as problematic has been reported in Rapid7 InsightVM and Nexpose 8.24.0. Impacted is the function generateRandomPassword of the file nsc.ks of the component New Password Handler. Performing a manipulation results in insufficient entropy.
This vulnerability is cataloged as CVE-2026-1814. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability described as critical has been identified in TP-Link Archer MR200 v5.2, Archer C20 v6, TL-WR850N v3 and TL-WR845N v4. Affected is the function JavaScript. Such manipulation leads to improper neutralization of directives in dynamically evaluated code.
This vulnerability is uniquely identified as CVE-2025-15551. The attack can only be initiated within the local network. No exploit exists.
A vulnerability classified as problematic was found in Silabs Simplicity SDK 2024.12.0. This affects an unknown part of the component 802.15.4 Packet Handler. The manipulation results in reachable assertion.
This vulnerability is known as CVE-2025-12131. Access to the local network is required for this attack. No exploit is available.
Upgrading the affected component is advised.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months.
The agency said the move is to drive down technical debt and minimize
A vulnerability was found in Linux Kernel up to 6.6.121/6.12.67/6.18.7/6.19-rc6 and classified as critical. This vulnerability affects the function sama5d2_adc of the component adc. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-71199. The attacker must have access to the local network to execute the attack. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability marked as problematic has been reported in pear pearweb up to 1.32.x. This vulnerability affects unknown code. Performing a manipulation results in predictable seed in pseudo-random number generator (prng).
This vulnerability is identified as CVE-2026-25235. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.18.5/6.19-rc4. The affected element is the function idpf_idc_vport_dev_down of the component idpf. This manipulation causes null pointer dereference.
This vulnerability is tracked as CVE-2026-23042. The attack is only possible within the local network. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Linux Kernel up to 6.8.2. Affected by this vulnerability is the function kvm_put_kvm. Executing a manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2024-26976. The attack can only be done within the local network. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.8.2. Impacted is the function completion_done of the component Data Structure Handler. Performing a manipulation results in use after free.
This vulnerability is identified as CVE-2024-26974. The attack can only be performed from the local network. There is not any exploit available.
It is advisable to upgrade the affected component.