Microsoft’s August 2025 Patch Tuesday addresses 107 security vulnerabilities, including one actively exploited zero-day in Windows Kerberos....
vulnerability
As of August 2025, more than 3,300 Citrix NetScaler devices remain vulnerable to CitrixBleed 2 (CVE-2025-5777), a...
QR codes have become ubiquitous in modern life, appearing on everything from product packaging to payment terminals....
A critical WinRAR vulnerability, tracked as CVE-2025-8088, was actively exploited as a zero-day in phishing campaigns to...
Microsoft has announced a significant security update affecting Microsoft 365 applications on Windows platforms. Starting late August...
Exposed API documentation has become a prime target for threat actors, providing a clear blueprint of system...
Starting July 25, 2025, all pornography websites in the UK must implement government-approved age verification methods under...
Kerberoasting remains a persistent threat to Active Directory (AD) environments, allowing attackers to crack service account passwords...
Administrators and security teams are urged to patch CrushFTP servers immediately following active exploitation of a critical...
Arch Linux has removed three compromised packages from its Arch User Repository (AUR) after discovering they contained...
Microsoft has acknowledged mislabeling a Windows Firewall logging issue as resolved in recent updates, confirming the problem...
WeTransfer, the popular file-sharing service, has clarified that user-uploaded files are not used to train artificial intelligence...
The UK’s National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) designed to...
Security researchers have identified critical vulnerabilities in Gigabyte motherboards that allow attackers to bypass Secure Boot and...
McDonald’s AI-powered hiring chatbot, “Olivia,” developed by Paradox.ai, exposed the personal data of over 64 million job...
Proof-of-concept (PoC) exploits for a critical SQL injection (SQLi) vulnerability in Fortinet FortiWeb have been publicly released,...
The developers of Gravity Forms, a widely used WordPress plugin with over 1 million active installations, have...
NVIDIA has issued guidance urging users to enable System Level Error-Correcting Code (ECC) protections for GDDR6-equipped GPUs...
A critical vulnerability in OpenVSX, the open-source extension marketplace used by popular VS Code forks like Cursor...
Microsoft has replaced the legacy JScript engine with JScript9Legacy in Windows 11 version 24H2 and later, marking...