CVE Feed
- CVE-2025-11641 – Tomofun Furbo 360/Furbo Mini Trial Restriction access control October 12, 2025
- CVE-2025-11642 – Tomofun Furbo 360/Furbo Mini Registration denial of service October 12, 2025
- CVE-2025-11640 – Tomofun Furbo 360/Furbo Mini Bluetooth Low Energy cleartext transmission October 12, 2025
- CVE-2025-11639 – Tomofun Furbo 360/Furbo Mini Debug Log S3 Bucket collect_logs.sh sensitive information October 12, 2025
- CVE-2025-11638 – Tomofun Furbo 360/Furbo Mini Bluetooth denial of service October 12, 2025
- CVE-2025-11637 – Tomofun Furbo 360 Audio race condition October 12, 2025
- CVE-2025-11636 – Tomofun Furbo 360 Account server-side request forgery October 12, 2025
- CVE-2025-2138 – IBM Engineering Requirements Management Doors Next data modification October 12, 2025
- CVE-2025-2139 – IBM Engineering Requirements Management Doors Next security bypass October 12, 2025
- CVE-2025-2140 – IBM Engineering Requirements Management Doors Next spoofing October 12, 2025
- CVE-2025-33096 – IBM Engineering Requirements Management Doors Next denial of service October 12, 2025
- CVE-2025-11635 – Tomofun Furbo 360 File Upload resource consumption October 12, 2025
- CVE-2025-11634 – Tomofun Furbo 360/Furbo Mini UART information disclosure October 12, 2025
- CVE-2025-11633 – Tomofun Furbo 360/Furbo Mini HTTP Traffic certificate validation October 12, 2025
- CVE-2025-52615 – HCL Unica Platform is impacted by misconfigured security related HTTP headers October 12, 2025
- CVE-2025-11631 – RainyGao DocSys deleteDoc.do path traversal October 12, 2025
- CVE-2025-31969 – HCL Unica Platform is impacted by misconfigured Content Security Policy (CSP) October 12, 2025
- CVE-2025-52614 – HCL Unica Platform is affected by a Cookie without HTTPOnly Flag Set vulnerability October 12, 2025
- CVE-2025-11630 – RainyGao DocSys File Upload uploadDoc.do updateRealDoc path traversal October 12, 2025
Microsoft Security
- Securing agentic AI: Your guide to the Microsoft Ignite sessions catalog October 9, 2025Security is a core focus at Microsoft Ignite 2025, reflected in dedicated sessions and hands-on experiences designed for security professionals and leaders. Take a look at the session catalog. The post Securing agentic AI: Your guide to the Microsoft Ignite sessions catalog appeared first on Microsoft Security Blog.Microsoft Security Team
- Investigating targeted “payroll pirate” attacks affecting US universities October 9, 2025Microsoft Threat Intelligence has identified a financially motivated threat actor that we track as Storm-2657 compromising employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts, attacks that have been dubbed “payroll pirate”. The post Investigating targeted “payroll pirate” attacks affecting US universities appeared first on Microsoft Security Blog.Microsoft Threat Intelligence
- Disrupting threats targeting Microsoft Teams October 7, 2025Threat actors seek to abuse Microsoft Teams features and capabilities across the attack chain, underscoring the importance for defenders to proactively monitor, detect, and respond effectively. In this blog, we recommend countermeasures and optimal controls across identity, endpoints, data apps, and network layers to help strengthen protection for enterprise Teams users. The post Disrupting threats […]Microsoft Threat Intelligence
- New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security October 7, 2025Microsoft Secure Future Initiative (SFI) patterns and practices are practical, actionable, insights from practitioners for practitioners based on Microsoft’s implementation of Zero Trust through the Microsoft Secure Future Initiatives. By adopting these patterns, organizations can accelerate their security maturity, reduce implementation friction, and build systems that are more secure by design, default, and in operation. The post New […]Hammad Rajjoub
- Inside Microsoft Threat Intelligence: Calm in the chaos October 6, 2025Incident response is never orderly. Threat actors don’t wait. Environments are compromised. Data is missing. Confidence is shaken. But for Microsoft’s Incident Response (IR) team, that chaos is exactly where the work begins. The post Inside Microsoft Threat Intelligence: Calm in the chaos appeared first on Microsoft Security Blog.Elliot Volkman