A vulnerability in the “Sign in with Google” authentication system has left millions of Americans at risk...
Vulnerabilities
Researchers at Microsoft have uncovered a vulnerability in Apple macOS that enables the bypassing of System Integrity...
Researchers have uncovered a method to compromise the ACE3 USB-C controller, a proprietary component integral to Apple’s...
A security researcher demonstrated the exploitation of a Server-Side Template Injection (SSTI) vulnerability in Spring Boot 3.3.4...
The British domain registrar Nominet is investigating a potential breach of its network, during which hackers exploited...
Researchers at Eclypsium have uncovered BIOS/UEFI vulnerabilities in the widely used Illumina iSeq 100 DNA sequencer. The...
According to a recent Trustwave report, hackers have intensified their attacks on e-commerce websites ahead of the...
A critical vulnerability has been discovered in the Monkey’s Audio (APE) codec, utilized on Samsung smartphones, allowing...
In October 2024, cybersecurity researcher Ben Sadeghi uncovered a critical vulnerability in Facebook’s advertising platform, enabling the...
Two critical vulnerabilities have been discovered in the popular WordPress plugin Fancy Product Designer, developed by Radykal,...
More than 4,000 unique web shells are exploiting expired domains and abandoned infrastructure, many of which are...
Hackers are actively exploiting CVE-2024-52875, a vulnerability discovered in GFI KerioControl—a firewall solution designed for small and...