CISA’s catalog has just expanded again, and this time the additions hit the Windows stack: six Microsoft vulnerabilities — spanning Windows Shell, MSHTML, Office Word, Desktop Window Manager, Remote Access Connection Manager, and Remote Desktop Services — were added to the Known Exploited...
Late on December 9, 2025 the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a WinRAR path‑traversal vulnerability — tracked as CVE‑2025‑6218 — to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence that attackers are actively abusing the bug in the wild; the...
Cisco Talos’ Halloween-themed roundup lands like a reminder: the calendar has turned, Windows 10’s free mainstream support is over, critical infrastructure bugs keep surfacing, and defenders must choose whether to treat users to smooth migrations or get tricked by inertia and exposure. The Talos...
CISA has added CVE-2025-5086 — a critical deserialization of untrusted data vulnerability in Dassault Systèmes DELMIA Apriso — to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation that elevates remediation priority under Binding Operational Directive (BOD)...
CISA’s KEV catalog grew again this week with the addition of two high‑risk router flaws tied to active exploitation, underscoring an uncomfortable reality for IT teams: inexpensive consumer and small‑office routers remain a prime target for adversaries and can pose outsized risk to enterprise...
August’s security headlines were dominated by a clutch of high-impact flaws — from archive utilities and consumer networking gear to enterprise-grade management consoles and cloud AI services — that together made rapid triage and patching unavoidable for defenders.
Background
The August 2025...
Cyble’s latest weekly scan shows a dizzying pace of disclosures and exploitation: researchers tracked 908 new vulnerabilities in the last seven days and report that more than 188 of those already have publicly available proofs‑of‑concept (PoCs), tightening the window defenders have to respond...
CISA’s addition of a single entry to its Known Exploited Vulnerabilities (KEV) Catalog this week — CVE-2025-43300, an out‑of‑bounds write in Apple’s Image I/O framework — sharpens the spotlight on a zero‑day that Apple says was exploited in highly targeted attacks and underscores how quickly...
In a standout moment for technology in the Channel Islands, Prosperity 24/7 has proudly become the first and only business in the region to gain the coveted Microsoft Azure Virtual Desktop specialisation. This formidable achievement is not just a badge of honor; it’s a testament to the team's...