Vercel has resolved a significant security flaw in Next.js middleware authentication, which could have allowed attackers to...
vulnerability
NetApp has resolved a critical privilege escalation vulnerability (NCSC-2025-0097) in its SnapCenter backup management platform, which could...
A newly disclosed critical vulnerability (CVE-2025-1097) in Kubernetes’ Ingress-Nginx controller enables attackers to execute arbitrary code and...
A newly discovered high-severity vulnerability (CVE-2025-1098) in Kubernetes’ Ingress-Nginx controller allows attackers to execute arbitrary code and...
A critical security vulnerability (CVE-2025-1974) in Kubernetes’ ingress-nginx controller has been disclosed, allowing unauthenticated attackers with pod...
A newly disclosed high-severity vulnerability (CVE-2025-24514) in Kubernetes’ ingress-nginx controller enables attackers to execute arbitrary code and...
A newly discovered critical vulnerability (CVE-2025-2726) affecting multiple H3C Magic series routers allows remote attackers to execute...
A critical command injection vulnerability (CVE-2025-2728) affecting H3C Magic NX30 Pro and NX400 routers has been identified,...
A critical security vulnerability (CVE-2025-2727) has been identified in H3C Magic NX30 Pro routers running firmware versions...
A critical vulnerability (CVE-2025-2729) has been identified in multiple H3C Magic series routers, exposing them to remote...
A critical security vulnerability affecting multiple H3C Magic series routers has been identified, allowing remote attackers to...
Security teams now have access to a powerful new open-source tool for analyzing binary security posture. Extrude...
VulnNodeApp serves as an intentionally vulnerable Node.js application specifically designed for security education and training purposes. This...
Ashok has emerged as a powerful open-source OSINT reconnaissance tool that consolidates multiple information-gathering capabilities into a...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
Mass-Assigner is a newly released open-source security tool that helps organizations identify mass assignment vulnerabilities in web...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
In today’s digital landscape where web applications form the core of business operations, penetration testing has become...
Mobile applications have become central to daily operations, from banking transactions to enterprise communications. However, this reliance...
Industrial Control Systems (ICS) and SCADA networks form the backbone of modern critical infrastructure, from power plants...