Cybersecurity Threats | Data Breaches | Supply Chain Attacks GitHub workflow breaches impact multiple repositories
Cybersecurity Vulnerabilities | Media Server Security | Raspberry Pi Over 300,000 Plex Media Server installations remain susceptible to exploitation due to CVE-2025-34158
Container Isolation | Docker Desktop | Security Vulnerability Docker vulnerability (CVE-2025-9074) allows container escape, assigned CVSS of 9.3
Cybersecurity Threats | SAP Security Risks | Vulnerability Exploitation SAP Netweaver exploits CVE-2025-31324 and CVE-2025-42999 publicly released
Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities Interconnected SAP exploits allow remote code execution
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
Denial of Service | Security Vulnerability | Software Update Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks
Cybersecurity Threats | Malicious Software | Supply Chain Attacks WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.
Code Auditing | Kernel Security | Vulnerability Exploitation Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.