
[ad_1]

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.
The flaws are listed below –
CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto Networks PAN-OS
[ad_2]
Source link
Build a website that pays you back with real revenue.
Related posts:
Stay Safe Online: Essential Tips for Safer Internet Day
Technology
Is Your Phone Your Best Friend or a Silent Spy?
Technology
Wipe Your Digital Footprints with Data Wipe Software
Technology
No, you’re not fired – but beware of job termination scams
Technology
DeceptiveDevelopment targets freelance developers
Technology
Fake job offers target coders with infostealers
Technology
Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
Technology
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Technology
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
Technology
Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads
Technology
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
Technology
Three Password Cracking Techniques and How to Defend Against Them
Technology
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Technology
SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent
Technology
Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
Technology
Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts
Technology
AI-Powered Social Engineering: Ancillary Tools and Techniques
Technology
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
Technology
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Technology
Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls
Technology
New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
Technology
⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More
Technology
CISO's Expert Guide To CTEM And Why It Matters
Technology
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
Technology
Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics
Technology
Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers
Technology
New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials
Technology
Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
Technology
Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
Technology
Debunking the AI Hype: Inside Real Hacker Tactics
Technology
Build a website that pays you back with real revenue.



















