Next.js Flaw Allows Unauthorized Access
Critical Next.js vulnerability (CVE-2025-29927) lets attackers bypass authorization, impacting versions before 15.2.3. Urgent updates are needed.
Critical Next.js vulnerability (CVE-2025-29927) lets attackers bypass authorization, impacting versions before 15.2.3. Urgent updates are needed.
A major cyberattack targeted Ukraine’s railway system, disrupting online services but not train operations. Restoration efforts are ongoing.
Astral Foods suffered a cyberattack causing a R20 million profit loss and operational disruption. Swift recovery was implemented, but the
The new VanHelsing ransomware targets various systems, employing advanced encryption techniques and demanding ransoms up to $500,000 from its victims.
INTERPOL’s Operation Red Card resulted in the arrest of 306 cybercrime suspects across seven African nations, seizing thousands of devices
A massive Oracle Cloud breach exposed 6 million records, impacting 140,000 businesses. The attacker, “rose87168,” is selling the data and
NYU’s March 2025 data breach exposed millions of applicants’ personal data, prompting a class action lawsuit investigation. Attorneys seek to
Microsoft’s Trusted Signing service is being abused to code-sign malware using short-lived certificates. This allows malicious software to bypass security
A major GitHub Actions breach targeted Coinbase, exploiting the tj-actions/changed-files action to steal secrets. Although Coinbase claims no damage, the
CISA warns of a critical NAKIVO backup flaw, CVE-2024-48248, allowing unauthorized file access, urging organizations to patch systems promptly.
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.