CVEFeed Newsroom – Latest Cybersecurity Updates
The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.
-
BleepingComputer
WinRAR patches bug letting malware launch from extracted archives
WinRAR has addressed a directory traversal vulnerability tracked as CVE-2025-6218 that, under certain circumstances, allows malware to be executed after extracting a malicious archive. The flaw tracke ...
-
BleepingComputer
New 'CitrixBleed 2' NetScaler flaw let hackers hijack sessions
A recent vulnerability in Citrix NetScaler ADC and Gateway is dubbed "CitrixBleed 2," after its similarity to an older exploited flaw that allowed unauthenticated attackers to hijack authentication se ...
-
Cyber Security News
Multiple Brother Devices Vulnerabilities Open Devices for Hacking
A comprehensive security research investigation has unveiled eight critical vulnerabilities affecting 742 printer and multifunction device models across four major manufacturers. The discovery, stemmi ...
-
The Hacker News
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Vulnerability / Network Security Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE- ...
-
Cyber Security News
Citrix NetScaler ADC and Gateway Vulnerability Actively Exploited in the Wild
Cloud Software Group has issued an urgent security advisory warning customers about a critical memory overflow vulnerability in NetScaler ADC and Gateway products, which could enable denial-of-service ...
-
The Hacker News
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Data Privacy / Vulnerability Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could ha ...
-
Cyber Security News
Kubernetes NodeRestriction Vulnerability Allows Nodes to Bypass Resource Allocation Checks
A newly disclosed vulnerability in Kubernetes has been identified that could allow compromised nodes to bypass critical authorization checks within the container orchestration platform. The security f ...
-
security.nl
Kritiek lek in honderden Brother-printers kan aanvaller admintoegang geven
Een kritieke kwetsbaarheid in honderden printermodellen van Brother kan een ongeauthenticeerde aanvaller op afstand admintoegang geven. Brother heeft voor meer dan zeshonderd modellen firmware-updates ...
-
Dark Reading
XOR Marks the Flaw in SAP GUI
Source: Tricky_Shark via ShutterstockSAP has patched a couple of vulnerabilities in its graphical user interface (SAP GUI) input history feature that give attackers a way to potentially access sensiti ...
-
Cyber Security News
Critical Kibana Vulnerabilities Allows Heap Corruption and Remote Code Execution
A severe heap corruption vulnerability in Kibana could let attackers achieve remote code execution using specially crafted HTML pages. The vulnerability, designated as CVE-2025-2135, stems from a Type ...