Aggregator
CVE-2025-20777 | MediaTek MT8883 Display out-of-bounds write (MSV-4752 / ALPS10184870)
CVE-2025-12465 | OpenSolution QuickCMS 6.8 sql injection (EUVD-2025-200223)
CVE-2025-63872 | DeepSeek up to 3.2 SVG cross site scripting (EUVD-2025-200270)
CVE-2025-63317 | Todoist SVG File Parser /api/v1/uploads cross site scripting (EUVD-2025-200090)
CVE-2025-13879 | SOLIDserver IPAM 8.2.3 list directory path traversal (EUVD-2025-200239)
CVE-2022-49909 | Linux Kernel up to 6.0.7 Bluetooth l2cap_conn_del reference count (EUVD-2025-12860 / Nessus ID 241175)
Devman
You must login to view this content
Security’s Next Control Plane: The Rise of Pipeline-First Architecture
For years, security operations have relied on monolithic architectures built around centralized collectors, rigid forwarding chains, and a single “system of record” where all data must land before action can be taken. On paper, that design promised simplicity and control. In practice, it delivered brittle systems, runaway ingest costs, and teams stuck maintaining plumbing instead..
The post Security’s Next Control Plane: The Rise of Pipeline-First Architecture appeared first on Security Boulevard.
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
ServiceNow to Acquire Identity Security Firm Veza
ServiceNow Inc. announced on Tuesday plans to acquire Veza in a move aimed at fortifying security for identity and access management. The acquisition will integrate Veza’s technology into ServiceNow’s Security and Risk portfolios, helping organizations monitor and control access to critical data, applications, systems, and artificial intelligence (AI) tools. The deal comes as businesses increasingly..
The post ServiceNow to Acquire Identity Security Firm Veza appeared first on Security Boulevard.
CVE-2025-50078 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 DML improper authorization (Nessus ID 244819 / WID-SEC-2025-1567)
CVE-2025-50079 | Oracle MySQL Server up to 8.0.42/8.4.5/9.3.0 Optimizer improper authorization (Nessus ID 253482 / WID-SEC-2025-1567)
CVE-2025-50068 | Oracle MySQL Cluster up to 8.0.42/8.4.5/9.3.0 General Local Privilege Escalation (Nessus ID 242320 / WID-SEC-2025-1567)
CVE-2025-50076 | Oracle MySQL Server up to 8.0.25 DML improper authorization (WID-SEC-2025-1567)
CVE-2025-50077 | Oracle MySQL Cluster/MySQL Server up to 7.6.34/8.0.42/8.4.5/9.3.0 InnoDB improper authorization (Nessus ID 242320 / WID-SEC-2025-1567)
CVE-2024-9287 | Python CPython up to 3.13.0 venv /venv/bin/python unquoted search path (Nessus ID 210114 / WID-SEC-2025-1567)
Closing the Document Security Gap: Why Document Workflows Must Be Part of Cybersecurity
Organizations are spending more than ever on cybersecurity, layering defenses around networks, endpoints, and applications. Yet a company’s documents, one of the most fundamental business assets, remains an overlooked weak spot. Documents flow across every department, cross company boundaries, and often contain the very data that compliance officers and security teams work hardest to protect...
The post Closing the Document Security Gap: Why Document Workflows Must Be Part of Cybersecurity appeared first on Security Boulevard.
How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers
As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Point’s Q2 Ransomware Report, the financial cybersecurity threat landscape is only intensifying. Gone are the days when the average hacker was a..
The post How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers appeared first on Security Boulevard.
Security Gap Widens as Organizations Rush to Deploy AI Agents Without Proper Identity Controls
Organizations are racing to implement autonomous artificial intelligence (AI) agents across their operations, but a sweeping new study reveals they’re doing so without adequate security frameworks, creating what researchers call “the unsecured frontier of autonomous operations.” The research, released Tuesday by Enterprise Management Associates (EMA), surveyed 271 IT, security, and identity and access management (IAM)..
The post Security Gap Widens as Organizations Rush to Deploy AI Agents Without Proper Identity Controls appeared first on Security Boulevard.