New Texas health information legislation that began to go into effect on Sept. 1 includes several noteworthy provisions including requirements related to health record data storage and artificial intelligence, said regulatory attorney Rachel Rose. Rose explains the significance of the new state law.
Hackers Accessed Backup Firewall Preference Files Firewall maker SonicWall is telling customers to reset credentials after hackers stole firewall configuration backup files stored in its cloud service. Hackers launched brute force attacks against servers storing backup files. They stole configuration data of roughly 5% of the install base.
Funding Supports Threat Hunting, Natural Language to Replace Legacy Detection Vega aims to replace patchwork AI integrations with an analytics layer that enables real-time, natural language detection across distributed data. Backed by Accel, the company will double headcount, improve detection tuning and reduce false positives without a SIEM rip-and-replace required.
FBI Director Claims 'Supremely Qualified' Unnamed Leaders Replaced Cyber Officials The FBI is facing growing scrutiny over reported unfilled cyber leadership roles and morale issues following politically charged dismissals, even as cybercrime hits $16.6B and hackers spoof FBI platforms - raising concerns about the bureau’s readiness to counter digital threats.
Startup Simulates Offensive and Defensive AI to Test and Thwart AI-Based Threats Irregular secured $80 million in funding to turn its research into scalable security tools for businesses adopting AI. With growing offensive AI capabilities, the company is racing to productize simulations that detect vulnerabilities before attackers do.
A vulnerability was found in Linux Kernel up to 5.10.162/5.15.86/6.0.18/6.1.4 and classified as critical. Affected by this issue is the function panfrost_gem_create_with_handle. The manipulation results in use after free.
This vulnerability is known as CVE-2022-50417. Access to the local network is required for this attack. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability classified as critical has been found in Linux Kernel up to 6.1.1. This issue affects the function acpi_ds_call_control_method of the component ACPICA. The manipulation leads to use after free.
This vulnerability is documented as CVE-2022-50411. The attack requires being on the local network. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Windows. It has been declared as critical. This impacts an unknown function of the component Defender Firewall Service. Executing manipulation can lead to type confusion.
This vulnerability is handled as CVE-2025-54104. It is possible to launch the attack on the local host. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows up to Server 2025. It has been classified as critical. This affects an unknown function of the component Management Service. Performing manipulation results in use after free.
This vulnerability is known as CVE-2025-54103. Attacking locally is a requirement. No exploit is available.
It is suggested to install a patch to address this issue.
A vulnerability was found in Microsoft Windows 11 24H2/Server 2022 23H2/Server 2025. It has been rated as critical. Affected is an unknown function of the component Brokering File System. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-54105. Local access is required to approach this attack. No exploit exists.
To fix this issue, it is recommended to deploy a patch.
A vulnerability labeled as critical has been found in Microsoft Windows 11 24H2/Server 2025. This affects an unknown part of the component Capability Access Management Service. Such manipulation leads to use after free.
This vulnerability is referenced as CVE-2025-54108. The attack can only be performed from a local environment. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability identified as problematic has been detected in Microsoft Windows. Affected by this issue is some unknown functionality of the component MapUrlToZone. This manipulation causes improper resolution of path equivalence.
The identification of this vulnerability is CVE-2025-54107. It is possible to initiate the attack remotely. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability marked as critical has been reported in Microsoft Windows. This vulnerability affects unknown code of the component Defender Firewall Service. Performing manipulation results in type confusion.
This vulnerability is identified as CVE-2025-54109. The attack is only possible with local access. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft Windows. The affected element is an unknown function of the component Virtual Hard Disk. The manipulation results in use after free.
This vulnerability is cataloged as CVE-2025-54112. The attack must be initiated from a local position. There is no exploit available.
A patch should be applied to remediate this issue.
A vulnerability, which was classified as critical, has been found in Microsoft Windows. The impacted element is an unknown function of the component RRAS. This manipulation causes heap-based buffer overflow.
This vulnerability is registered as CVE-2025-54113. Remote exploitation of the attack is possible. No exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as problematic, was found in Microsoft Windows. This affects an unknown function of the component Connected Devices Platform Service. Such manipulation leads to untrusted pointer dereference.
This vulnerability is documented as CVE-2025-54114. The attack needs to be performed locally. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in Microsoft Windows and classified as critical. Affected is an unknown function of the component MultiPoint Services. Executing manipulation can lead to improper access controls.
This vulnerability appears as CVE-2025-54116. The attack requires local access. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
A vulnerability described as problematic has been identified in Microsoft Excel. The impacted element is an unknown function. The manipulation results in buffer over-read.
This vulnerability is identified as CVE-2025-54901. The attack can be executed remotely. There is not any exploit available.
It is best practice to apply a patch to resolve this issue.