A developer at Elon Musk’s artificial intelligence company xAI accidentally leaked a private API key on GitHub,...
Vulnerability Management
South Korea’s largest mobile carrier, SK Telecom (SKT), is scrambling to contain the fallout from a massive...
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with CVE-2025-31324,...
France’s data protection authority, the CNIL, is escalating enforcement measures against companies failing to secure sensitive data...
Delta Electronics’ ISPSoft programming software, widely used in industrial automation systems, contains multiple critical vulnerabilities that could...
A critical vulnerability in YesWiki, tracked as CVE-2025-46348, allows unauthenticated attackers to create and download site backups...
The Outlaw cybergang, also known as “Dota,” has intensified its global campaign against Linux systems, deploying a...
Recent reports highlight a surge in MSSQL injection attacks, with threat actors exploiting vulnerabilities to execute remote...
The Huntress Agent, a widely deployed endpoint detection and response (EDR) tool, relies on its updater service...
A critical SQL injection vulnerability (CVE-2017-18362) in ConnectWise’s ManagedITSync integration exposed Kaseya VSA servers to unauthenticated remote...
When a database outage escalates into a full-blown security incident, the response strategy determines whether an organization...
A newly disclosed vulnerability in Apache Tomcat, tracked as CVE-2025-23181, allows unprivileged command execution with a CVSS...
A critical remote code execution (RCE) vulnerability has been identified in PhpGurukul’s Online Banquet Booking System (OBBS)...
A sophisticated phishing campaign is targeting WooCommerce users with fraudulent emails urging them to install a fake...
Not every security vulnerability poses an immediate high risk, but attackers often chain seemingly minor flaws to...
Microsoft’s introduction of hotpatching for Windows Server 2025 marks a significant shift in enterprise patch management. Starting...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three critical vulnerabilities to its Known Exploited...
Rapid7’s newly launched Remediation Hub, part of its Exposure Command platform, aims to transform how security teams...
Modern security teams face an overwhelming challenge: managing vulnerabilities across complex environments while balancing risk, compliance, and...
Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload...