The $10 million THORChain exploit was caused by a vulnerability in its GG20 signing framework, which allowed the hacker to ...
Google on Wednesday published exploit code for an unfixed vulnerability in its Chromium browser codebase that threatens ...
Microsoft Exchange users are urged to mitigate a zero-day vulnerability that CISA has confirmed is under active exploitation.
When Ivanti disclosed critical flaws in its Connect Secure VPN gateway in January 2024, attackers had working exploits ...
Vulnerability exploitation has overtaken compromised credentials for the first time in nearly two decades as the most common ...
Microsoft has disclosed that a privilege escalation and a denial-of-service flaw in Defender has come under active ...
Microsoft responds to Windows 11 encryption bypass vulnerability with new mitigation.
The latest Microsoft Patch Tuesday rollout featured no zero-days. However, an angry hacker has just dropped two new 0-day ...
Linux distributions are affected by Fragnesia, a new kernel vulnerability tracked as CVE-2026-46300 that can be exploited for ...
Drupal is warning users that it’s preparing a patch for a ‘highly critical’ vulnerability that may be exploited shortly after ...
ADAMnetworks research uncovered Underminr, a shared hosting vulnerability that lets attackers bypass security protections and ...
A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed ...