Recent advisories from U.S. federal authorities on vulnerabilities in certain operational technology devices underscore the potential security risks that many healthcare providers frequently underestimate, said Sila Özeren, a security research engineer at Picus Security.
Schellman CEO Avani Desai on Balancing Innovation and Compliance in Uncertain Market The Trump administration’s AI action plan signals a major deregulatory shift, setting up a patchwork of state regulations on AI deployments. Company policies must be “flexible enough to meet the strictest state without rewriting them every few months," said Avani Desai, CEO, Schellman.
Space Policy and Tech Head Paul Liias on Dealing With Satellite Vulnerabilities A major disruption of civil and military satellites could cause chaos on the ground to communications, navigation and other vital services. But the threats don't just come from missiles. They also comes from hackers who could exploit numerous vulnerabilities, said Estonia's Paul Liias.
Cyfinoid's Shrivastava Calls for Greater Visibility Over Software Security Risks Software supply chain security is all too often viewed through a narrow lens, focused mostly on code dependencies and Software Bill of Materials. But the devil remains in the details and risks can emerge from overlooked areas, said Anant Shrivastava, founder and chief researcher at Cyfinoid.
Researchers Say AI Bots Blur Lines Between Identity, Consent and Cyber Defense As generative AI programs continue to evolve, they are introducing new threats to the modern workplace. Digital twins, once confined to industrial systems, now enable hyper-realistic copies of actual employees to mimic vocal patterns, behaviors and even pick up on decision-making trends.
A vulnerability classified as problematic has been found in SOGo Web Mail up to 5.6.0. Affected is an unknown function. The manipulation leads to improper control of resource identifiers.
This vulnerability is traded as CVE-2025-50340. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Siemens SINEC Traffic Analyzer up to 2.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2025-40768. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ivanti Avalanche and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2025-8296. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in Ivanti Avalanche. Affected by this issue is some unknown functionality of the component Configuration Handler. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2025-8297. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.6.100/6.12.40/6.15.8. It has been declared as critical. This issue affects the function xfrmi_changelink of the file net/core/dev.c of the component xfrm. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2025-38500. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Microsoft Edge on Android. This vulnerability affects unknown code. The manipulation leads to the ui performs the wrong action.
This vulnerability was named CVE-2025-49736. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Dynamics 365 and classified as problematic. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-49745. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Edge on Android. It has been classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to clickjacking.
This vulnerability is handled as CVE-2025-49755. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows. It has been rated as critical. Affected is an unknown function of the component Hyper-V. The manipulation leads to numeric truncation error.
This vulnerability is traded as CVE-2025-53723. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft SharePoint Enterprise Server. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2025-49712. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.