CISA Orders Agencies to Mitigate Cisco ASA Zero-Day Exploitation
CISA logo

CISA Orders Agencies to Mitigate Cisco ASA Zero-Day Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive (ED) 25-03 in response to active exploitation of zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Cisco Firepower devices. The vulnerabilities, tracked as CVE-2025-20333 and CVE-2025-20362, pose a severe risk to federal networks and require immediate mitigation. Background:
Editorial Team 2 min read
Recorded Future Insikt Group August 2025 Report: 18 High-Impact Vulnerabilities Prioritized for Patching

Recorded Future Insikt Group August 2025 Report: 18 High-Impact Vulnerabilities Prioritized for Patching

Recorded Future’s Insikt Group identified 18 high-impact vulnerabilities in August 2025 that organizations should prioritize for remediation, marking a decrease from the 22 vulnerabilities highlighted in July. Despite the overall reduction, the number of Very Critical vulnerabilities remained steady at 16 compared to the previous month. These flaws impacted
Editorial Team 3 min read
New Zealand Records 1,315 Cyber Security Incidents with 27% Drop in Financial Losses
National Cyber Security Center of New Zealand (Photo: Security.land)

New Zealand Records 1,315 Cyber Security Incidents with 27% Drop in Financial Losses

The National Cyber Security Centre (NCSC) of New Zealand has documented a significant volume of cyber security incidents in its latest quarterly assessment, with social engineering attacks emerging as a prominent threat vector targeting organizations across the country. Quarter Two Statistics Reveal Persistent Threat Landscape Between April 1 and June
Editorial Team 2 min read
Critical Security Flaws Expose Flowise AI Framework to Remote Code Execution Attacks

Critical Security Flaws Expose Flowise AI Framework to Remote Code Execution Attacks

Seven severe security vulnerabilities have been discovered in Flowise, a popular low-code development framework designed for building large language model applications. The security flaws, five of which carry the highest “Critical” severity rating, enable attackers to execute remote code, manipulate server files, and hijack user accounts through multiple attack vectors.
Editorial Team 3 min read