Satellite systems are increasingly becoming targets of sophisticated cyberattacks, with nation-states and cybercriminal groups exploiting vulnerabilities in...
vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three critical vulnerabilities to its Known Exploited...
Rapid7’s newly launched Remediation Hub, part of its Exposure Command platform, aims to transform how security teams...
Modern security teams face an overwhelming challenge: managing vulnerabilities across complex environments while balancing risk, compliance, and...
Over 1,200 internet-exposed SAP NetWeaver instances are vulnerable to an actively exploited maximum severity unauthenticated file upload...
The SANS Internet Storm Center (ISC) Stormcast for April 29, 2025, highlights critical cybersecurity threats, including active...
Bug hunting has transformed from a niche activity into a professionalized field where security researchers earn substantial...
SberTech, a Russian software developer under the Sber ecosystem, has expanded its public bug bounty program on...
Recent research by NSFOCUS Fuying Laboratory has uncovered 19 distinct Advanced Persistent Threat (APT) campaigns targeting organizations...
A sophisticated multi-stage carding attack has been identified targeting Magento eCommerce sites running outdated versions, particularly Magento...
Rapid7 has released its Exposure Assessment Platform (EAP) Buyer’s Guide, a resource designed to help organizations navigate...
A critical vulnerability (CVE-2025-34491) in GFI MailEssentials enables authenticated attackers to execute arbitrary code through .NET deserialization...
A critical vulnerability (CVE-2025-46661) has been identified in IPW Systems Metazo versions up to 8.1.3, allowing unauthenticated...
A critical stack-based buffer overflow vulnerability (CVE-2025-4007) has been identified in Tenda W12 and i24 routers, affecting...
A critical vulnerability (CVE-2015-2079) in Usermin, a web-based administration tool, allows authenticated attackers to execute arbitrary code...
The cybersecurity landscape continues to evolve with increasing automation, as evidenced by a 16.7% year-over-year rise in...
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with three...
A newly disclosed vulnerability in Apple’s iOS operating system (CVE-2025-24091) allows malicious applications to trigger an irreversible...
The latest episode of the SANS Internet Storm Center (ISC) Stormcast, released on April 28, 2025, covers...
Security researchers at Shelltrail have identified three critical vulnerabilities in the IXON VPN client that could allow...