Rockwell Automation has disclosed three high-severity vulnerabilities affecting its Arena Simulation software that could allow attackers to execute arbitrary code on targeted systems.
The vulnerabilities, discovered by security researcher Michael Heinzl and tracked as CVE-2025-7025, CVE-2025-7032, and CVE-2025-7033, affect all Arena Simulation versions 16.20.09...
A critical vulnerabilities affecting over 100 Dell laptop models that could allow attackers to completely compromise systems and steal sensitive data, including passwords and biometric information.
The vulnerabilities, collectively dubbed "ReVault" by Cisco Talos researchers, pose a significant threat to millions of business-critical devices...
Security researchers have revealed alarming details about how attackers are exploiting recently disclosed Microsoft SharePoint vulnerabilities to steal critical IIS Machine Keys, potentially giving hackers persistent backdoor access to compromised servers.
The exploitation campaign, which began approximately 10 days ago, leverages CVE-2025-53770 and CVE-2025-53771...
MediaTek has disclosed three critical security vulnerabilities in its August 2025 Product Security Bulletin that affect a wide range of chipsets used in smartphones, tablets, and IoT devices.
These out-of-bounds write vulnerabilities enable local privilege escalation attacks, potentially compromising millions of devices worldwide.
This high-severity...
Two critical security vulnerabilities discovered in Anthropic's Claude Code have demonstrated how artificial intelligence tools designed to enhance developer productivity can be weaponized against themselves through sophisticated prompt engineering techniques.
The vulnerabilities, tracked as CVE-2025-54794 and CVE-2025-54795, allowed attackers to bypass security restrictions and...
A critical vulnerabilities in Partner Software and Partner Web applications that pose significant risks to government agencies and municipal organizations across the United States.
The vulnerabilities allow authenticated attackers to execute arbitrary code on compromised systems, potentially granting complete control over affected infrastructure.
Partner Software,...