With years of new threats coming out every day for everything from a light bulb to cars, it ‘s become more important than ever to protect your devices the best you can. Below are the current vulnerabilities which have been analyzed within the previous eight days.
- How can we counter online disinformation? | Unlocked 403 cybersecurity podcast (S2E2)
- Catching a phish with many faces
- Congratulations to the Top MSRC 2025 Q1 Security Researchers!
- Beware of phone scams demanding money for ‘missed jury duty’
- Toll road scams are in overdrive: Here’s how to protect yourself
- RSAC 2025 wrap-up – Week in security with Tony Anscombe
- TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
- This month in security with Tony Anscombe – April 2025 edition
- How safe and secure is your iPhone really?
- Deepfake 'doctors' take to TikTok to peddle bogus cures
- How fraudsters abuse Google Forms to spread scams
- Will super-smart AI be attacking us anytime soon?
- Zero Day Quest 2025: $1.6 million awarded for vulnerability research
- CapCut copycats are on the prowl
- They’re coming for your data: What are infostealers and how do I stay safe?
For a full listing of vulnerabilities please visit the National Vulnerability Database