The first day of Pwn2Own Berlin 2025 brought the cybersecurity spotlight back to some of the world’s most critical software platforms, revealing a dynamic and, at times, unsettling glimpse into the vulnerabilities that underscore the modern IT ecosystem. On this opening day alone, researchers...
CISA’s recent inclusion of two Linux kernel vulnerabilities in its Known Exploited Vulnerabilities Catalog underscores the evolving landscape of cybersecurity threats. Despite the fact that these vulnerabilities specifically target Linux systems, the broader implications are far-reaching. In...
The recent CISA report on RESURGE malware—associated with a vulnerability in Ivanti Connect Secure devices—provides a sobering reminder that cyber threats are evolving in sophistication and persistence. Although this attack vector targets critical infrastructure running on Linux, Windows system...