WP Ghost, a popular security WordPress plugin, was carrying a vulnerability that allowed threat actors to launch Remote Code ...
Two sources in the zero-day industry say Operation Zero's prices for exploits against the popular messaging app Telegram will ...
Apple iOS apps leak sensitive credentials in their code. Find out which secrets are most commonly exposed and how they put ...
Apache Tomcat flaw CVE-2025-24813 is under active exploitation, enabling remote code execution via PUT requests.
Data resilience solutions provider Veeam Software released a critical patch for its Veeam Backup & Replication product. The ...
A new Marvel Rivals exploit is allowing players to give two popular heroes more firepower than ever before that's dominating ...
Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated ...
By simply sending HTTP requests, attackers can trigger the deserialisation of malicious data in Tomcat's session storage and ...
Hackers exploit PHP flaw (CVE-2024-4577) to deploy Quasar RAT and XMRig miners, with Taiwan hit hardest. Update PHP now to ...
Microsoft link (LNK) files fail to present users with critical information, and malicious actors exploit this flaw to embed ...
Across the Trump administration, officials are pushing the law to its limits to justify the president's efforts to ...
An exploitation avenue found by Trend Micro in Windows has been used in an eight-year-long spying campaign, but there's no sign of a fix from Microsoft, which apparently considers this a low priority.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results