Technology ❯ Cybersecurity ❯ Vulnerabilities
Microsoft SharePoint Google Chrome Apple Security Updates Cisco AsyncOS CVE-2025-20393 Microsoft Security Updates Remote Code Execution WhatsApp Ivanti CVE-2024-43461 CVE-2025-2783 Microsoft Products Qualcomm Chips Windows Vulnerabilities Android Security Microsoft Software CVE-2025-43300 CVE-2025-10585 Account Takeover CVE-2025-4918 CVE-2025-4919 CVE-2025-5419 WinRAR CVE Identifiers Spyware Event Highlights macOS Vulnerabilities CISA CVE-2025-7775 Hacking Groups Incident Response CVE-2025-49706 Fortinet VPN Products Microsoft SharePoint Hack CVE-2025-40599 SonicWall SSL VPN Android Vulnerabilities ImageIO Framework Cisco Cisco Firewalls Microsoft Exchange Server CVE-2025-38352 Cisco IOS User Interaction Out-of-Bounds Write State-Sponsored Attacks CVE-2025-4428 CVE-2025-4427 CVE-2025-21043 Oracle E-Business Suite CVE-2025-27915 CVE-2021-43798 Zimbra Collaboration Suite Gogs Chakra JavaScript Engine CVE-2025-11371 Emergency Updates DNG Image Files LNK File Vulnerability CVE-2025-14372 CVE-2025-21042 CVE-2025-5777 CVE-2025-13223 CVE-2025-14373 CVE-2025-20337 Privilege Escalation Cisco ISE Secure Boot CVE-2025-22224 Software Patches CVE-2026-21519 CVE-2026-21514 iOS Security CVE-2026-21510 CVE-2026-20805 Dynamic Link Editor CVE-2026-21513 Microsoft Windows CVE-2026-21509 Ivanti Endpoint Manager Mobile Ivanti EPMM Microsoft CVE-2026-20700 Chrome Vulnerability Dell RecoverPoint Downgrade Attacks CVE-2026-2441 NAS Devices CVE-2024-43047 CVE-2024-43093 Apple Security RomCom Hacking Group Firewall Exploits Fortinet Firewalls PostgreSQL Windows Cyberattacks Patches Apple Software Updates State Actors
Researchers detail stealthy persistence using Ghost NICs alongside the newer Grimbolt backdoor.