A critical security vulnerability affecting multiple H3C Magic series routers has been identified, allowing remote attackers to...
vulnerability
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
VulnNodeApp serves as an intentionally vulnerable Node.js application specifically designed for security education and training purposes. This...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Mass-Assigner is a newly released open-source security tool that helps organizations identify mass assignment vulnerabilities in web...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
In today’s digital landscape where web applications form the core of business operations, penetration testing has become...
Mobile applications have become central to daily operations, from banking transactions to enterprise communications. However, this reliance...
Industrial Control Systems (ICS) and SCADA networks form the backbone of modern critical infrastructure, from power plants...
When integrating applications with Microsoft Azure, administrators may encounter the error “AADSTS700054: response_type ‘id_token’ is not enabled...
Large Language Models (LLMs) are increasingly integrated into enterprise workflows, but a new attack vector—ASCII smuggling—exploits Unicode’s...
ESET researchers have uncovered a sophisticated adware campaign called HotPage, which abuses a vulnerable Microsoft-signed driver to...
ESET’s latest APT Activity Report for Q2-Q3 2024 reveals significant developments in state-aligned cyber threats, with China,...
Summary for Security Leadership The Russia-aligned RomCom APT group (also tracked as Storm-0978 or UNC2596) has been...
Summary for CISOs: A critical vulnerability (CVE-2024-7344) in UEFI Secure Boot allows attackers to bypass security checks...
A critical authentication bypass vulnerability (CVE-2025-2747) has been identified in Kentico Xperience CMS, affecting versions through 13.0.178....
Summary A critical SQL injection vulnerability (CVE-2025-2683) has been discovered in PHPGurukul’s Bank Locker Management System version...
A critical vulnerability (CVE-2025-2687) has been discovered in PHPGurukul eLearning System 1.0, affecting its Image Handler component....
A critical deserialization vulnerability (CVE-2025-2690) has been discovered in the Yii2 PHP framework, allowing remote code execution....