CVEFeed Newsroom – Latest Cybersecurity Updates
The "Cyber Newsroom Feed" module is a live feed of the latest cyber news enriched with CVE and vulnerability data. The feed is updated every 5 minutes and includes the latest news from the cyber security industry. The feed is designed to provide users with a comprehensive overview of the latest cyber security news and trends.
-
CybersecurityNews
Critical AdonisJS Vulnerability Allow Remote Attacker to Write Files On Server
A critical path traversal vulnerability in AdonisJS has been discovered that could allow remote attackers to write arbitrary files to server filesystems, potentially leading to complete system comprom ...
-
The Hacker News
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
Jan 06, 2026Ravie LakshmananIoT Security / Vulnerability The CERT Coordination Center (CERT/CC) has disclosed details of an unpatched security flaw impacting TOTOLINK EX200 wireless range extender t ...
-
CybersecurityNews
Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks
Google has issued its January 2026 Android Security Bulletin, urging users to update to the 2026-01-05 patch level or later to mitigate a critical vulnerability in Dolby components. The standout issue ...
-
0patch.com
Micropatches Released for Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (CVE-2025-47987)
July 2025 Windows Updates brought a patch for CVE-2025-47987, a privilege escalation vulnerability in Windows Credential Security Support Provider that could allow a local low-privileged attacker to e ...
-
The Cyber Express
What Is a Proxy Server? A Complete Guide to Types, Uses, and Benefits
The term proxy server is very popular these days, especially when discussions are around internet security, internet privacy, and network management. But what exactly is a proxy server? What purpose d ...
-
CybersecurityNews
New Critical n8n Vulnerability Allow Attackers to Execute Arbitrary Commands
A critical vulnerability has been discovered in n8n, the popular open-source workflow automation platform, enabling authenticated attackers to execute arbitrary commands on host systems. The vulnerabi ...
-
CybersecurityNews
New macOS TCC Bypass Vulnerability Allow Attackers to Access Sensitive User Data
A critical security vulnerability in macOS has been discovered that enables attackers to completely bypass Transparency, Consent, and Control (TCC) protections. Apple’s primary defense mechanism for p ...
-
security.nl
Google dicht kritiek lek in Dolby op Android-platform
Een kritiek lek in het Android-platform is gedicht. Het lek zit in de implementatie van Dolby in het mobiele besturingssysteem, en daarbij specifiek de DD+ Codec. CVE-2025-54957 is een bufferoverflow- ...
-
CybersecurityNews
Threat Actors Leverage Commodity Loader to Attack Organizations in Targeted Email Campaigns
Cybersecurity threat researchers have uncovered a highly sophisticated malware campaign leveraging a commodity loader being shared across multiple threat actor groups. The operation targets manufactur ...
-
CybersecurityNews
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025
The United States Cybersecurity and Infrastructure Security Agency (CISA) has significantly expanded its Known Exploited Vulnerabilities (KEV) Catalog to 1,484 vulnerabilities as of December 2025, mar ...