A developer at Elon Musk’s artificial intelligence company xAI accidentally leaked a private API key on GitHub,...
vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with CVE-2025-31324,...
A set of critical vulnerabilities in Apple’s AirPlay Protocol and AirPlay SDK, collectively dubbed “AirBorne,” exposes devices...
Delta Electronics’ ISPSoft programming software, widely used in industrial automation systems, contains multiple critical vulnerabilities that could...
Recent reports highlight a surge in scanning activity targeting SMS gateways and APIs, with attackers seeking to...
A critical SQL injection vulnerability (CVE-2025-4039) has been identified in PHPGurukul’s Rail Pass Management System version 1.0,...
A critical vulnerability in YesWiki, tracked as CVE-2025-46348, allows unauthenticated attackers to create and download site backups...
Recent reports highlight a surge in MSSQL injection attacks, with threat actors exploiting vulnerabilities to execute remote...
A critical SQL injection vulnerability (CVE-2017-18362) in ConnectWise’s ManagedITSync integration exposed Kaseya VSA servers to unauthenticated remote...
When a database outage escalates into a full-blown security incident, the response strategy determines whether an organization...
A newly disclosed vulnerability in Apache Tomcat, tracked as CVE-2025-23181, allows unprivileged command execution with a CVSS...
A critical remote code execution (RCE) vulnerability has been identified in PhpGurukul’s Online Banquet Booking System (OBBS)...
A sophisticated phishing campaign is targeting WooCommerce users with fraudulent emails urging them to install a fake...
Not every security vulnerability poses an immediate high risk, but attackers often chain seemingly minor flaws to...
Satellite systems are increasingly becoming targets of sophisticated cyberattacks, with nation-states and cybercriminal groups exploiting vulnerabilities in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three critical vulnerabilities to its Known Exploited...
Rapid7’s newly launched Remediation Hub, part of its Exposure Command platform, aims to transform how security teams...
Modern security teams face an overwhelming challenge: managing vulnerabilities across complex environments while balancing risk, compliance, and...
Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload...
The SANS Internet Storm Center (ISC) Stormcast for April 29, 2025, highlights critical cybersecurity threats, including active...