Firewall Daily

FBI Cracks Two-Year Cyberstalking Case Involving Minors in Florida and Alabama

Pensacola man pleads guilty to cyberstalking and sending obscene content to girls aged 9–15 over two years, despite repeated pleas…

10 months ago

Two High-Severity Flaws Found in NetScaler Products: CVE-2025-5349 and CVE-2025-5777

CVE-2025-5349 and CVE-2025-5777 expose critical flaws in NetScaler ADC and Gateway. Cloud Software Group urges immediate upgrades to supported secure…

10 months ago

CISA Flags CVE-2023-0386 as Actively Exploited Linux Kernel Privilege Escalation Threat

CISA warns of active exploitation of CVE-2023-0386, a Linux Kernel privilege escalation flaw in OverlayFS, urging immediate patching to prevent…

10 months ago

Israel-Iran Conflict Sparks Wider Cyber Conflict, New Malware

The Israel-Iran conflict has also been felt in cyberspace, as hacktivists have launched DDoS, malware and other cyberattacks.

10 months ago

Keyless Entry Vulnerability (CVE-2025-6029) Threatens KIA Vehicles in Ecuador, Researcher Reports

CVE-2025-6029 exposes a flaw in KIA Ecuador's keyless entry systems, putting thousands of Soluto, Rio, and Picanto models at high…

10 months ago

Apple Patches Flaw Exploited in Zero-click Paragon Spyware Attacks

Apple has fixed a vulnerability that was used in zero-click attacks that installed Paragon Graphite spyware on the iPhones of…

10 months ago

Microsoft Patch Tuesday June 2025: One Zero-Day, Nine High-risk Flaws Fixed

Microsoft’s Patch Tuesday updates for June 2025 include fixes for an actively exploited zero-day vulnerability and nine additional flaws at…

10 months ago

Software Supply Chain Attacks Have Surged in Recent Months

Software supply chain attacks rose sharply in April-May 2025, hitting IT and telecom sectors the hardest.

10 months ago

Over 20 Malicious Crypto Wallet Apps Found on Google Play, CRIL Warns

Over 20 fake crypto wallet apps on the Play Store were found stealing users’ mnemonic phrases in a large-scale phishing…

10 months ago

New Pressures, Old Systems: Why Government CISOs Are Calling for Cyber Resilience Now

CISOs need to embed trust across the AI lifecycle, from data sourcing and model design to deployment and monitoring.

10 months ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More