Skip to content
InfosecToday.com
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com

Exploit

  • a stylized image of a person standing in front of a globe
    Cybersecurity Threats | Data Breaches  | Supply Chain Attacks

    GitHub workflow breaches impact multiple repositories

  • black and silver audio mixer
    Cybersecurity Vulnerabilities  | Media Server Security  | Raspberry Pi

    Over 300,000 Plex Media Server installations remain susceptible to exploitation due to CVE-2025-34158

  • blue and red cargo ship on sea during daytime
    Container Isolation  | Docker Desktop | Security Vulnerability

    Docker vulnerability (CVE-2025-9074) allows container escape, assigned CVSS of 9.3

  • a close up of a computer keyboard in the dark
    Cybersecurity Threats | SAP Security Risks  | Vulnerability Exploitation

    SAP Netweaver exploits CVE-2025-31324 and CVE-2025-42999 publicly released

  • a stylized image of a person standing in front of a globe
    Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities

    Interconnected SAP exploits allow remote code execution

  • surveillance, cctv, security, camera, video, monitoring, spy, watch, privacy, record, monitor, secure, guard, control, protection, observe, cam, watching, lens, cybersecurity, cctv, cctv, cctv, cctv, cctv
    Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities

    CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software

  • black flat screen computer monitor
    Denial of Service | Security Vulnerability | Software Update 

    Apache Tomcat vulnerabilities allow Denial of Service (DoS) attacks

  • shallow focus photography of computer codes
    Cybersecurity Threats | Malicious Software | Supply Chain Attacks

    WhatsApp developers are facing threats from malicious npm packages that come with a remote kill switch.

  • cybersecurity, digital, security, internet, cyber, protection, privacy, technology, secure, safety, data, lock, encryption, network, digital security, icon, idea, concept, digital art, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity
    Code Auditing  | Kernel Security | Vulnerability Exploitation

    Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

How cybersecure is your business? Take our free quiz and find out
Cyber risk scorecard
  • Cybersecurity News
  • Cybersecurity Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search