Critical Security Flaws In Workflow Automation Tool Put Pakistani Businesses At Risk
CERT warns of critical vulnerabilities in a widely used workflow automation tool that could allow hackers to take control of business systems in Pakistan.
CERT warns of critical vulnerabilities in a widely used workflow automation tool that could allow hackers to take control of business systems in Pakistan.
YOTTABYTE R&D team issues a critical alert on multiple high severity vulnerabilities in n8n workflow automation platform that could allow remote code execution and exposure of sensitive credentials.
Kaspersky reports a sharp increase in Linux attacks during Q4 2025, driven by exploitation of legacy flaws and growing desktop adoption, with archiver vulnerabilities also heavily targeted.
A high severity vulnerability in Google Chrome linked to Gemini Live side panel could allow malicious browser extensions to access sensitive user data including camera, microphone, and local files.
Yottabyte R and D warns of a max severity authentication bypass in Cisco Catalyst SD WAN Manager vManage, urging immediate patching and access restrictions due to active exploitation.
A critical CVE-2026-1357 vulnerability in WPvivid Backup and Migration plugin exposes over 900,000 WordPress sites to remote code execution. Users urged to update to version 0.9.124 immediately.
Cybersecurity researchers have disclosed a critical vulnerability in Docker’s Ask Gordon AI assistant that enabled code execution and data exfiltration through malicious Docker image metadata, now patched in version 4.50.0.
Fortinet has issued security updates for a critical FortiOS authentication bypass flaw under active exploitation, affecting FortiOS, FortiManager, and FortiAnalyzer, prompting urgent mitigation guidance and CISA action.
CISA adds four vulnerabilities to its KEV catalog citing active exploitation while security firms detail ongoing abuse of critical Citrix NetScaler flaws leaking sensitive data.
NADRA announces Bug Bounty Challenge 2026 a nationwide competition engaging universities and organizations to identify vulnerabilities and enhance national cybersecurity.