A critical buffer overflow vulnerability (CVE-2025-4298) has been identified in Tenda AC1206 routers, affecting firmware versions up...
Vulnerability Management
A high-severity vulnerability (CVE-2025-4279) has been identified in the WordPress External Image Replace plugin, enabling authenticated attackers...
A recent study by the FIDO Alliance reveals that 36% of online users have experienced at least...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has escalated the urgency around a critical vulnerability in...
Cyberattacks targeting educational institutions have surged in recent weeks, with the Coweta County School System in Georgia...
A critical vulnerability in OpenCTI, tracked as CVE-2025-24977, allows authenticated users to execute arbitrary commands on the...
Apple’s AirPlay protocol, a proprietary wireless technology used for streaming audio and video across devices, was found...
The US Cybersecurity and Infrastructure Security Agency (CISA) has officially added two critical vulnerabilities affecting SonicWall Secure...
Smartphones have become prime targets for cyber threats, from border surveillance to sophisticated malware. For organizations, securing...
Microsoft has quietly addressed a bug affecting Start Menu jump lists on Windows 10 version 22H2 systems....
A developer at Elon Musk’s artificial intelligence company xAI accidentally leaked a private API key on GitHub,...
South Korea’s largest mobile carrier, SK Telecom (SKT), is scrambling to contain the fallout from a massive...
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with CVE-2025-31324,...
France’s data protection authority, the CNIL, is escalating enforcement measures against companies failing to secure sensitive data...
Delta Electronics’ ISPSoft programming software, widely used in industrial automation systems, contains multiple critical vulnerabilities that could...
A critical vulnerability in YesWiki, tracked as CVE-2025-46348, allows unauthenticated attackers to create and download site backups...
The Outlaw cybergang, also known as “Dota,” has intensified its global campaign against Linux systems, deploying a...
Recent reports highlight a surge in MSSQL injection attacks, with threat actors exploiting vulnerabilities to execute remote...
The Huntress Agent, a widely deployed endpoint detection and response (EDR) tool, relies on its updater service...
A critical SQL injection vulnerability (CVE-2017-18362) in ConnectWise’s ManagedITSync integration exposed Kaseya VSA servers to unauthenticated remote...