A high-severity SQL injection vulnerability (CVE-2025-31547) has been identified in the Aphotrax Uptime Robot Plugin for WordPress,...
Web Security
A widespread cyber campaign has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript code that redirects...
A high-severity open redirect vulnerability (CVE-2025-24381) has been identified in Dell Unity storage systems running versions 5.4...
A critical vulnerability (CVE-2025-2294) has been identified in the Kubio AI Page Builder plugin for WordPress, affecting...
Reports indicate that a prominent Indonesian educational technology platform may have been the target of a cybersecurity...
Network traffic analysis often reveals hidden artifacts, including images transferred over HTTP. These images can contain valuable...
A recent investigation by Trend Micro’s Managed XDR team uncovered a sophisticated web shell attack targeting Internet...
VulnNodeApp serves as an intentionally vulnerable Node.js application specifically designed for security education and training purposes. This...
Bug bounty programs have become a proven strategy for strengthening system security through collaboration with external researchers....
In today’s digital landscape where web applications form the core of business operations, penetration testing has become...
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
Apache Tomcat, a widely used open-source Java servlet container, has recently addressed a critical vulnerability that could...
A critical vulnerability, CVE-2025-2609, has been identified in MagnusSolution’s MagnusBilling software, a widely used billing and call...