by Haja Mo October 30, 2025 Cybersecurity Exploitation of CVE-2025-59287 began after public disclosure and the release of proof-of-concept code Previous Story Sophos Firewall v22: Health Check Next Story Kentucky Supreme Court Expands Jurisdictional Reach Over Out-of-State Manufacturers