A critical SQL injection vulnerability (CVE-2025-25686) has been identified in SEMCMS versions 5.0 and earlier, posing significant...
Vulnerability Management
A recent breach at Oracle Health has exposed sensitive patient data across multiple US hospitals, raising concerns...
Sam’s Club, the Walmart-owned retail warehouse chain, is currently investigating claims of a data breach linked to...
The shift to cloud computing has introduced new cybersecurity challenges for U.S. Federal agencies, particularly in maintaining...
A newly discovered SQL injection vulnerability in the widely used GLPI IT Service Management (ITSM) tool poses...
Microsoft has addressed critical Remote Desktop Protocol (RDP) and Remote Desktop Services (RDS) connectivity issues stemming from...
The Tor Project has issued an emergency update, Tor Browser 14.0.8, exclusively for Windows users. This release...
A critical security flaw in NetApp SnapCenter, tracked as CVE-2025-26512, could allow authenticated users to escalate privileges...
Cybersecurity researchers have uncovered a campaign involving hijacked npm packages, some over nine years old, that were...
A high-severity vulnerability (CVE-2025-26733) has been identified in the Shinetheme Traveler WordPress theme, affecting versions up to...
A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-26873, has been disclosed in the Shinetheme Traveler...
A critical SQL injection vulnerability (CVE-2025-26898) has been identified in the Shinetheme Traveler WordPress theme, affecting versions...
A high-severity vulnerability (CVE-2025-30232) has been identified in Exim mail servers, affecting versions 4.96 through 4.98.1. The...
A high-severity open redirect vulnerability (CVE-2025-24381) has been identified in Dell Unity storage systems running versions 5.4...
A critical vulnerability (CVE-2025-2294) has been identified in the Kubio AI Page Builder plugin for WordPress, affecting...
Defense contractor MORSECORP Inc. has agreed to pay $4.6 million to resolve allegations of cybersecurity fraud involving...
AhnLab’s Threat Intelligence Platform has released 19 new Snort rules addressing critical vulnerabilities including PostgreSQL SQL injection...
Recent forensic investigations by Volexity have uncovered a sophisticated attack campaign exploiting two chained zero-day vulnerabilities in...
Active Directory Discretionary Access Control Lists (DACLs) serve as a fundamental security mechanism governing access to directory...
Misconfigured WriteOwner permissions in Active Directory can enable attackers to take ownership of critical objects, bypass security...