In this 15-minute podcast, identity experts examine key findings from recent industry research on machine identity governance and how you can secure them
COO Francis deSouza Explains Google Cloud's Push for Unified Multi-Cloud Security COO Francis deSouza shares insights into Google Cloud’s security priorities as it pursues the $32 billion acquisition of Wiz. He explains the need for seamless multi-cloud protection, the value of Mandiant's threat intelligence, and how AI is changing threat detection and response at scale.
Also: CISA Warns of Unpatched Train Brake Vulnerability This week: Louis Vuitton and Co-op confirm breaches, unpatched train brake flaw, Barclays fined £42M pounds for financial crime failures, secret U.K. program relocated thousands of Afghans, ex-soldier pleads guilty to hacking, Ukrainian hackers claim hit on Russian drone supplier.
A vulnerability was found in Lenovo Browser. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-6248. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Lenovo PC Manager, Browser and App Store. It has been classified as critical. This affects an unknown part of the component Protection Driver. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2025-4657. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running a global ad fraud scheme against the company's advertising platforms. [...]
A vulnerability was found in Lenovo Vantage and Commercial Vantage and classified as critical. Affected by this issue is some unknown functionality of the component Registry Handler. The manipulation leads to argument injection.
This vulnerability is handled as CVE-2025-6232. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Lenovo Vantage and Commercial Vantage and classified as critical. Affected by this vulnerability is an unknown functionality of the component Configuration File Handler. The manipulation leads to argument injection.
This vulnerability is known as CVE-2025-6231. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Motorola Software Fix. Affected is an unknown function of the component Installer. The manipulation leads to uncontrolled search path.
This vulnerability is traded as CVE-2025-1700. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
Security teams aren't patching firmware promptly, no one's vetting the endpoints before purchase, and visibility into potential dangers is limited — despite more and more cyberattackers targeting printers as a matter of course.
A vulnerability, which was classified as problematic, has been found in Motorola Smart Connect App on Android. This issue affects some unknown processing of the component Bluetooth Transmission Alliance Protocol. The manipulation leads to cleartext transmission of sensitive information.
The identification of this vulnerability is CVE-2025-2818. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in GoldenDict 1.5.0/1.5.1. This vulnerability affects unknown code. The manipulation leads to information disclosure.
This vulnerability was named CVE-2025-53964. The attack can only be done within the local network. There is no exploit available.
A vulnerability classified as problematic has been found in HCL Connections 7.0/8.0. This affects an unknown part of the component Request Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-42209. It is possible to initiate the attack remotely. There is no exploit available.
Texas adoption agency suffers major data leak, exposing over 1.1M sensitive records including case notes, contact info, and internal communications to public without any security authentication or password.
A vulnerability was found in Sophos Intercept X 1.22/2024.3/2024.3.2 on Windows. It has been rated as critical. Affected by this issue is some unknown functionality of the component Central Device Encryption. The manipulation leads to deserialization.
This vulnerability is handled as CVE-2025-7433. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sophos Intercept X up to 1.21 on Windows. It has been classified as problematic. Affected is an unknown function of the component Installer. The manipulation leads to uncontrolled search path.
This vulnerability is traded as CVE-2025-7472. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Sophos Intercept X 2024.3 on Windows and classified as critical. This issue affects some unknown processing of the component Updater. The manipulation leads to incorrect default permissions.
The identification of this vulnerability is CVE-2024-13972. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.