Pierce County Library Data Breach Impacts 340,000

In April 2025, hackers stole personal information belonging to patrons and employees and their family members.

The post Pierce County Library Data Breach Impacts 340,000 appeared first on SecurityWeek.

SecurityWeek – ​Read More

Unpatched Gogs Zero-Day Exploited for Months

The exploited flaw allows attackers to overwrite files outside the repository, leading to remote code execution.

The post Unpatched Gogs Zero-Day Exploited for Months appeared first on SecurityWeek.

SecurityWeek – ​Read More

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances accessible over the internet, according to new findings from Wiz.
The flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwrite in the file update API of the Go-based self-hosted Git service. A fix for the issue is said to be currently in the

The Hacker News – ​Read More

The best cloud hosting services for 2025: Expert tested

We’ve tested and ranked the best cloud hosting services available to help you choose the right option for your business or side project.

Latest news – ​Read More

Copilot’s No-Code AI Agents Liable to Leak Company Data

Microsoft puts the power of AI in the hands of everyday non-technical Joes. It’s a nice idea, and a surefire recipe for security issues.

darkreading – ​Read More

The AI leader’s new balance: What changes (and what remains) in the age of algorithms

Successful leaders will harness the power of AI while amplifying essential human capabilities. Three experts share essential recommendations that every executive should have on their agenda.

Latest news – ​Read More

How to use the new Linux terminal on your Android device – it’s easy

There’s a powerful new feature for Android users: The Linux terminal. It unlocks a whole new level of control.

Latest news – ​Read More

Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

The Chrome zero-day does not have a CVE and it’s unclear who reported it and which browser component it affects.

The post Google Patches Mysterious Chrome Zero-Day Exploited in the Wild appeared first on SecurityWeek.

SecurityWeek – ​Read More

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.
“Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution,” security researcher Bryan Masters said.

The Hacker News – ​Read More

This magical dry bag is the surprise iPhone travel accessory I didn’t know I needed

Sea to Summit’s View Dry Bag is a lightweight, go-anywhere safeguard for your gadgets.

Latest news – ​Read More