News
The exploitation of CVE-2025-29824 also points to the trend of ransomware actors using zero-days to infiltrate targets. Last ...
All four vulnerabilities have been rectified by SysAid with the release of on-premise version 24.4.60 b16 in early March 2025 ...
A federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in monetary ...
PyPI package 'discordpydebug' hides a RAT, downloaded 11,574 times, using stealthy HTTP polling to bypass defenses.
Europol dismantled six DDoS-for-hire services, arrested four, seized nine domains—disrupting attacks since 2022.
CVE-2025-27007 exploited in OttoKit WordPress plugin before v1.0.83 enables admin creation without authentication.
A new report Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection analyzing gaps in SSE implementations ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added CVE-2025-27363 to its Known Exploited ...
Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things (IoT) ...
A recently disclosed critical security flaw impacting the open-source Langflow platform has been added to the Known Exploited ...
Reckless and Ruthless Rabbit scams use fake celebrity ads, RDGAs, and cloaking tools to target victims across Eastern Europe ...
Microsoft warns default Helm charts expose Kubernetes apps by prioritizing ease over security, risking data leaks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results