Apple confirms hidden iOS 26 security update, and Google confirms silent iOS 18 spyware compromise. What you need to know and ...
Chrome users face a new threat as VoidStealer 2.0 bypasses ABE protections and steals data during browser startup processes.
Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
New approach to application security in production at 11 companies analyzes code behavior at runtime rather than relying on CVEs or external defenses. PALO ALTO, Calif., March 18, ...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed ...
Researchers uncover “DarkSword,” a powerful iPhone exploit targeting millions via compromised websites. Learn how it works ...
VEX helps public-sector security teams prioritize repairs by identifying which vulnerabilities affect their systems.
The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's ...
Russia-linked APT28 has exploited a high-severity XSS vulnerability in Zimbra in attacks against Ukrainian entities.
Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch appeared
Admins have been handed a patching emergency as Amazon reveals that Interlock ransomware started targeting the FMC flaw in ...
Rapid7 says median time from publication to CISA KEV inclusion dropped to five days ...
Interlock ransomware is actively exploiting CVE-2026-20131 (CVSS 10.0) in Cisco FMC, enabling unauthenticated remote code ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results