Unpatched Gogs Zero-Day RCE (CVE-2025-8110) Actively Exploited
An unpatched Gogs zero-day (CVE-2025-8110) that bypasses a previous fix is being used to compromise more than 700 internet-exposed servers.
Read MoreAn unpatched Gogs zero-day (CVE-2025-8110) that bypasses a previous fix is being used to compromise more than 700 internet-exposed servers.
Read MoreNew “ToolShell” exploit chain is actively being used to compromise SharePoint servers.
Read MoreReliance on known IoCs makes many phishing attempts appear “zero-day,” giving attackers a window to bypass defenses before they are flagged.
Read MoreA zero-day flaw in Windows has been exploited by multiple state-sponsored attackers since 2017. Security teams are urging users to adopt recommended mitigations while awaiting an official patch.
Read MoreMeta’s security team has disclosed details of a zero-day flaw in version 2.13.0 of FreeType that allows arbitrary code execution.
Read MoreThe competition, hosted by Trend Micro’s Zero Day Initiative (ZDI), focused on uncovering security flaws in automotive technologies.
Read MoreThis ‘use-after-free’ vulnerability allows remote code execution and has been actively exploited in the wild.
Read MoreA massive data breach from Dell and Chrome fixes a zero-day in recent patch.
Read MoreCisco has a super-critical zero-day flaw in IOS XE, and research shows that default and “easy” passwords are the most common passwords used by admins.
Read MoreOwl Labs CVE’s are retracted. Also Qakbot is not quite dead yet, and other notable patches for the first week in October.
Read More