Fortillect
HomeNewsForumsDocs
HomeNewsForumsDocs
Sign InSign Up

© 2025 Fortillect. All rights reserved.

Fortillect - Cybersecurity News and Intelligence Platform

Cybersecurity News

Browse the latest cybersecurity news, breaches, vulnerabilities, and trends. Filter by category to find the information most relevant to you.

Vulnerabilities and Exploits

How Brandolini’s law informs our everyday infosec reality
Help Net Security
Aug 11, 2025

How Brandolini’s law informs our everyday infosec reality

Brandolini’s law, also known as the “bullshit asymmetry principle”, is simple but devastating: “The amount of energy needed to refute bullshit is an order of magnitude bigger than to produce it.” While it’s often thrown around in political debates and social …

Read full article
WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately
Internet
Aug 11, 2025

WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day vulnerability. Tracked as CVE-2025-8088 (CVSS score: 8.8), the issue has been described as a case of path traversal affecting the Windows ve…

Read full article
From legacy to SaaS: Why complexity is the enemy of enterprise security
Help Net Security
Aug 11, 2025

From legacy to SaaS: Why complexity is the enemy of enterprise security

In this Help Net Security interview, Robert Buljevic, Technology Consultant at Bridge IT, discusses how the coexistence of legacy systems and SaaS applications is changing the way organizations approach security. He explains why finding the right balance betw…

Read full article
Review: From Day Zero to Zero Day
Help Net Security
Aug 11, 2025

Review: From Day Zero to Zero Day

From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author Eugene Lim is a securit…

Read full article
Pentesting is now central to CISO strategy
Help Net Security
Aug 11, 2025

Pentesting is now central to CISO strategy

Security leaders are rethinking their approach to cybersecurity as digital supply chains expand and generative AI becomes embedded in critical systems. A recent survey of 225 security leaders conducted by Emerald Research found that 68% are concerned about th…

Read full article
Security flaws in a carmaker's web portal let one hacker remotely unlock cars from anywhere | TechCrunch
TechCrunch
Aug 11, 2025

Security flaws in a carmaker's web portal let one hacker remotely unlock cars from anywhere | TechCrunch

Security researcher Eaton Zveare told TechCrunch that the flaws he discovered in the carmaker's centralized dealer portal exposed vast access to customer and vehicle data. With this access, Zveare said he could remotely take over a customer's account and unlo…

Read full article
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
Internet
Aug 10, 2025

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create a malicious botnet and use it to conduct power distributed denial-of-service (DDoS) attacks. The approach has been codenamed Win-DDoS …

Read full article
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
Internet
Aug 10, 2025

Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation

Cybersecurity researchers have presented new findings related to a now-patched security issue in Microsoft's Windows Remote Procedure Call (RPC) communication protocol that could be abused by an attacker to conduct spoofing attacks and impersonate a known ser…

Read full article
Bitdefender Product Sponsored
BleepingComputer
Aug 10, 2025

Bitdefender Product Sponsored

Bitdefender Product Sponsored - posted in Anti-Virus, Anti-Malware, and Privacy Software: Bitdefender Free:  bitdefender antivirus have free version for personal use.  can be downloaded for windows and macos and android and ios Bitdefender Total Security: bit…

Read full article
Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025
Help Net Security
Aug 10, 2025

Week in review: SonicWall firewalls targeted in ransomware attacks, Black Hat USA 2025

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Black Hat USA 2025 Black Hat USA 2025 took place at the Mandalay Bay Convention Center in Las Vegas. Explore related news, photos, product releases, and more. AI…

Read full article
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Internet
Aug 9, 2025

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. "This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating syst…

Read full article
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models
Internet
Aug 9, 2025

Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models

Cybersecurity researchers have uncovered multiple security flaws in Dell's ControlVault3 firmware and its associated Windows APIs that could have been abused by attackers to bypass Windows login, extract cryptographic keys, as well as maintain access even aft…

Read full article
...