“In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use,” BIND developers wrote in Wednesday’s disclosure. “BIND can be tricked into caching attacker responses, if the spoofing is successful.” CVE-2025-40778 also raises the possibility of …
Read More »Tag Archives: vulnerabilities
Nation-State Actor Steals F5 Source Code and Undisclosed Vulnerabilities
Executive Summary On Oct. 15, 2025, F5 — a U.S. technology company — disclosed that a nation-state threat actor conducted a significant long-term compromise of their corporate networks. In this incident, attackers stole source code from their BIG-IP suite of products and information about undisclosed vulnerabilities. F5’s BIG-IP suite is commonly used by large organizations, primarily in the U.S. but …
Read More »Google DeepMind unveils CodeMender, an AI agent that autonomously patches software vulnerabilities
Alphabet Inc.’s Google DeepMind lab today shared results for CodeMender, an artificial intelligence-powered agent that automatically detects, patches and rewrites vulnerable code to prevent future exploits. CodeMember builds on DeepMind’s previous AI-based vulnerability discovery projects such as Big Sleep and OSS-Fuzz, by combining the reasoning power of Gemini Deep Think models with advanced program analysis techniques. The aim is to …
Read More »Apple pushes EU to repeal tech rules over feature delays, app vulnerabilities – Reuters
Apple pushes EU to repeal tech rules over feature delays, app vulnerabilities Reuters Apple Asks EU to Repeal Bloc’s Landmark Digital Markets Act The Wall Street Journal Apple calls for changes to anti-monopoly laws and says it may stop shipping to the EU The Guardian Apple Asks EU to Repeal Sweeping Big Tech Antitrust Rules Bloomberg.com Apple demands EU scrap landmark digital rules Financial Times …
Read More »Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities
Apple launched a slate of new iPhones on Tuesday loaded with the company’s new A19 and A19 Pro chips. Along with an ultrathin iPhone Air and other redesigns, the new phones come with a less flashy upgrade that could turn out to be the true killer feature. A security improvement called Memory Integrity Enforcement combines always-on, chip-level protections with software …
Read More »Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack
In response to the discovery of actively exploited 0-day vulnerabilities, Google has released its September 2025 Android Security Bulletin, rolling out patch level 2025-09-05 to safeguard millions of devices. The bulletin details critical issues in both System and Kernel components, and emphasizes the importance of immediate updates to mitigate remote code execution risks. Key Takeaways1. Patch 2025-09-05 fixes CVE-2025-38352 (zero-interaction …
Read More »Aggies show vulnerabilities in 42-24 win over UTSA
The Texas A&M Aggies took the field for the first time in the 2025 season tonight against the UTSA Roadrunners, bringing the always arduous offseason to an end. The first game is always exciting, and especially one in which your team walked away with a 42-24 victory. But despite the ultimately comfortable margin, most Aggies likely walked away from this …
Read More »Google says its AI-based bug hunter found 20 security vulnerabilities
Google’s AI-powered bug hunter has just reported its first batch of security vulnerabilities. Heather Adkins, Google’s vice president of security, announced Monday that its LLM-based vulnerability researcher Big Sleep found and reported 20 flaws in various popular open source software. Adkins said that Big Sleep, which is developed by the company’s AI department DeepMind as well as its elite team …
Read More »Disrupting active exploitation of on-premises SharePoint vulnerabilities
On July 19, 2025, Microsoft Security Response Center (MSRC) published a blog addressing active attacks against on-premises SharePoint servers that exploit CVE-2025-49706, a spoofing vulnerability, and CVE-2025-49704, a remote code execution vulnerability. These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in Microsoft 365. Microsoft has released new comprehensive security updates for all supported versions of …
Read More »