AMD confirms Zen 5 chips hit by critical bug – but a fix on the way
Affecting a wide range of EPYC and Ryzen processors, the bug compromises a processor’s pseudorandom number generator.
Latest news – Read More
Affecting a wide range of EPYC and Ryzen processors, the bug compromises a processor’s pseudorandom number generator.
Latest news – Read More
The newest Apple Watch SE comes with much-needed improvements, and you can snag it for 20% off right now.
Latest news – Read More
Stick to your holiday budget this season with these giftable gadgets under $100, even before Black Friday officially begins in a few weeks.
Latest news – Read More
Looking to get ahead on your holiday shopping a few weeks early? We found the best early Black Friday tablet deals from Apple, Samsung, Microsoft, and more.
Latest news – Read More
Black Friday is a month away, but Best Buy’s savings kicked off early. These are my favorites live now.
Latest news – Read More
I often have to grab screen recordings of my Linux desktop, and these are the apps I would suggest.
Latest news – Read More

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Dell BSAFE, two in Fade In screenwriting software, and one in Trufflehog.
The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.
For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.
Discovered by Piotr Bania of Cisco Talos.
Fade In is a cross-platform text handling software for screenwriters.
TALOS-2025-2250 (CVE-2025-53855) is an out-of-bounds write vulnerability in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .fadein file can lead to an out-of-bounds write.
TALOS-2025-2252 (CVE-2025-53814) is a use-after-free vulnerability in the XML parser functionality of GCC Productions Inc. Fade In 4.2.0. A specially crafted .xml file can lead to heap-based memory corruption.
Discovered by Adam Reiser of Cisco ASIG.
TruffleHog is a detection system for code repositories and ticket systems that finds exposed sensitive information, such as API keys and passwords. This vulnerability is described in an accompanying article on the Truffle Security website. The vuln is an arbitrary code execution vulnerability in the Git functionality of TruffleHog 3.90.2, TALOS-2025-2243 (CVE-2025-41390). A specially crafted repository can lead to a arbitrary code execution. An attacker can provide a malicious repository to trigger this vulnerability.
Discovered by Jason Crowder.
Dell BSAFE Crypto-C is FIPS-140 validated cryptography development kit for C/C++ environments. In cooperation with Jason Crowder, Talos published three vulnerabilities in the Dell BSAFE Crypto-C module. This product is at end of service; the vulnerable versions were added to an existing CVE.
TALOS-2025-2140 (CVE-2019-3728) is an integer overflow vulnerability, and TALOS-2025-2141 (CVE-2019-3728) is an integer underflow vulnerability. In both cases, a specially crafted ASN.1 record can lead to an out-of-bounds read. An attacker can provide a malformed ASN.1 record to trigger this vulnerability.
TALOS-2025-2142 (CVE-2019-3728) is a stack overflow vulnerability. A specially crafted ASN.1 record can lead to denial of service.
Cisco Talos Blog – Read More
Google updates Chrome’s enhanced autofill to handle passports, driver’s licenses, and vehicle IDs like VINs, with opt-in confirmation and encryption.
The post Chrome Expands Autofill to Passports, Licenses, and Vehicle Details appeared first on TechRepublic.
Security Archives – TechRepublic – Read More
Now you can give Liquid Glass a tinted look on your iPhone, iPad, and Mac.
Latest news – Read More
Threat actors engage in elaborate attack chains to infect trucking and logistics companies with remote access tools.
The post Transportation Companies Hacked to Steal Cargo appeared first on SecurityWeek.
SecurityWeek – Read More