#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

32 C
Dubai
Friday, July 4, 2025
HomeTopics 1Application Security

Application Security

spot_imgspot_imgspot_imgspot_img

Threat Analysis: Chinese Threat Actor Exploits Critical SAP Vulnerability (CVE-2025-31324) in the Wild

In an alarming development that underscores the persistent targeting of enterprise-critical systems, CVE-2025-31324, a critical deserialization vulnerability in SAP NetWeaver Visual Composer has been...

Exploiting the Kernel: How Play Ransomware Leveraged a Windows Zero-Day for Privilege Escalation

In early April 2025, cybersecurity researchers uncovered a sophisticated attack by the Play ransomware group, also known as Balloonfly. This operation exploited a previously...

Securing Kubernetes: Understanding and Mitigating Threats to Containerized Environments

As organizations increasingly adopt Kubernetes and containerized workloads, the attack surface for cyber threats has expanded dramatically. According to Microsoft Threat Intelligence, 51% of...

Critical SAP NetWeaver Vulnerability Uncovered: How ReliaQuest Exposed CVE-2025-31324 and What It Means for Enterprises

A Looming Threat to Critical Business Systems. On April 22, 2025, cybersecurity firm ReliaQuest revealed an active exploitation campaign targeting SAP NetWeaver, the backbone...

CVE-2025-2636: Critical Local File Inclusion Flaw in InstaWP Connect Plugin Puts 500K+ WordPress Sites at Risk

A critical vulnerability in InstaWP Connect, a popular WordPress plugin with over 500,000 active installations, has exposed millions of websites to remote code execution...

Trojanized Messaging Apps and Budget Android Devices: A Perfect Storm for Cryptocurrency Theft

In an era where digital communication and cryptocurrency transactions are ubiquitous, the security of our devices and applications is paramount. Recent investigations have uncovered...

Gleaming Pisces Exploits Python Ecosystem to Deliver PondRAT Malware Targeting Developers

A new cyber threat has emerged, targeting software developers through malicious Python packages. The North Korea-linked advanced persistent threat (APT) group known as Gleaming...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img