University of Maryland Medical Center Said FBI Is Also Investigating Case An academic medical center is facing a class action lawsuit alleging one of its pharmacists installed keylogging software on 400 computers over a decade to spy on the personal lives and intimate moments of coworkers. The pharmacist is also facing a criminal investigation, the hospital said.
Espionage Campaign Mainly Targeted European Organizations A Russian nation-state threat actor exploited "lesser known" features of Microsoft Windows remote desktop protocol to target European organizations for espionage. Hackers used RDP to deploy a malicious application and access data from victims.
AI Leaders Call for Proactive US Response Amid Chinese Technology Breakthroughs The United States risks losing the so-called "AI Cold War" against China unless it abandons traditional containment strategies and adapts to Beijing's advances, panelists told lawmakers Tuesday. "I'm as stunned as all of you about just how fast China has caught up," said Adam Thierer.
Zero Trust Network Access Firm Plans to Enhance Platform and Grow Revenue Faster Tailscale has landed $160 million in Series C funding to scale its platform and meet growing demand from AI and enterprise firms. The networking company will invest in engineering to support multi-cloud and identity-based networking features.
A vulnerability was found in themefusecom Brizy Plugin up to 2.6.14 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-32198. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in WP Project Manager Plugin up to 2.6.22 on WordPress and classified as problematic. Affected by this issue is some unknown functionality of the component SVG File Upload Handler. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-3100. The attack may be launched remotely. There is no exploit available.