A critical security vulnerability affecting multiple H3C Magic series routers has been identified, allowing remote attackers to...
Red-Team
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
In an era of evolving cyber threats, organizations are adopting realistic methods to test their defenses. Red...
Summary for CISOs: A critical vulnerability (CVE-2024-7344) in UEFI Secure Boot allows attackers to bypass security checks...
A critical authentication bypass vulnerability (CVE-2025-2747) has been identified in Kentico Xperience CMS, affecting versions through 13.0.178....
Summary A critical SQL injection vulnerability (CVE-2025-2683) has been discovered in PHPGurukul’s Bank Locker Management System version...
A critical vulnerability (CVE-2025-2687) has been discovered in PHPGurukul eLearning System 1.0, affecting its Image Handler component....
A critical deserialization vulnerability (CVE-2025-2690) has been discovered in the Yii2 PHP framework, allowing remote code execution....
Zoho Corporation has addressed a medium-severity authentication vulnerability (CVE-2025-1723) in ManageEngine ADSelfService Plus versions 6510 and earlier....
Broadcom has addressed multiple high-severity vulnerabilities in VMware ESXi, Workstation, and Fusion products, as detailed in NCSC...
Summary: IBM has addressed critical security vulnerabilities in its enterprise storage products, including authentication bypass (CVE-2025-0159) and...
SAP has released security updates addressing multiple vulnerabilities across its software portfolio, including SAP Commerce, SAP NetWeaver,...
A critical authorization bypass vulnerability (CVE-2024-53351) has been discovered in PipeCD v0.49, allowing attackers to access service...
A critical SQL injection vulnerability (CVE-2025-30590) has been discovered in the Dourou Flickr set slideshows plugin, affecting...
Summary: Fortinet has disclosed a critical buffer underwrite vulnerability (CVE-2023-25610) affecting multiple versions of FortiOS and FortiProxy,...
A severe security flaw in Next.js, tracked as CVE-2025-29927, allows attackers to bypass authentication and authorization checks...
Microsoft has recently addressed a series of critical vulnerabilities in its Windows operating system, as highlighted in...
Microsoft has recently addressed several critical vulnerabilities in its Azure platform, as reported by the Dutch National...
Fortinet has recently addressed a critical vulnerability affecting multiple products, including FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb....