Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

8 Recommended Account Takeover Security Providers

In 2025, account takeover (ATO) attacks are a significant – and growing – cybersecurity threat, especially in the…

HackRead
#web#mac#git#java#intel#auth#ssl
Cl0p Ransomware Lists NHS UK as Victim, Days After Washington Post Breach

Cl0p ransomware lists NHS UK as a victim days after The Washington Post confirms a major Oracle E-Business breach linked to CVE-2025-61882.

Microsoft Patch Tuesday for November 2025 — Snort rules and prominent vulnerabilities

Microsoft has released its monthly security update for November 2025, which includes 63 vulnerabilities affecting a range of products, including 5 that Microsoft marked as “critical.”

Bridging the Skills Gap: How Military Veterans Are Strengthening Cybersecurity

From intelligence analysts to surface warfare officers, military veterans of all backgrounds are successfully pivoting to cybersecurity careers and strengthening the industry's defense capabilities.

Have I Been Pwned Adds 1.96B Accounts From Synthient Credential Data

Have I Been Pwned (HIBP), the popular breach notification service, has added another massive dataset to its platform.…

GHSA-6fhj-vr9j-g45r: CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection

### Impact The XML [`Validator`](https://docs.oracle.com/javase/8/docs/api/javax/xml/validation/Validator.html) used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed *parsing* of XML BOMs, but not *validation*. ### Patches The vulnerability has been fixed in cyclonedx-core-java version 11.0.1. ### Workarounds If feasible, applications can reject XML documents before handing them to cyclonedx-core-java for validation. This may be an option if incoming CycloneDX BOMs are known to be in JSON format. ### References * The issue was introduced via https://github.com/CycloneDX/cyclonedx-core-java/commit/162aa594f347b3f612fe0a45071693c3cd398ce9 * The issue was fixed via https://github.com/CycloneDX/cyclonedx-core-java/pull/737 * https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#sc...

Intel Sues Ex-Engineer for Stealing 18,000 ‘Top Secret’ Files

Intel, the leading computer chip maker, has filed a lawsuit seeking at least $250,000 in damages from a…

Why Organizations Can’t Ignore Vendor Risk Assessment in Today’s Cyber-Threat Landscape

In an era where digital ecosystems extend far beyond a company’s internal network, enterprise cybersecurity is no longer…

New Browser Security Report Reveals Emerging Threats for Enterprises

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in a single place, the user’s browser. Yet traditional controls like DLP, EDR, and SSE still operate one layer too low. What’s emerging isn’t just a blindspot. It’s a parallel threat surface: unmanaged extensions acting like supply chain implants, GenAI