The Interlock ransomware gang has been exploiting a maximum severity remote code execution (RCE) vulnerability in Cisco's ...
A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities and is targeting users in Saudi Arabia, Turkey, ...
The DarkSword iOS exploit chain was used by the Russian APT behind the Coruna exploit in attacks targeting Ukraine.
A sophisticated iPhone hacking technique and surveillance campaign ran rampant internationally for months, prior to a patch ...
CVE-2026-32746 exposes telnetd via pre-auth flaw (CVSS 9.8), enabling root RCE through port 23, risking full system takeover.
Ubuntu CVE-2026-3888 flaw exploits cleanup timing in snap-confine to gain root access, risking full system compromise.
Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as ...
First‑of‑its‑kind Preemptive Cyber Defense Platform Provides Visibility into Shadow AI, Fortifies Endpoints, and Stops ...
An N-day vulnerability in Microsoft Word exposes nearly 14 million assets. Attackers can exploit this flaw to bypass security prompts, enabling deployment of malware and establishing persistent access ...
New approach to application security in production at 11 companies analyzes code behavior at runtime rather than relying on CVEs or external defenses. PALO ALTO, Calif., March 18, ...
AI-assisted code speeds development, but introduces vulnerabilities at an alarming rate. Waratek IAST reports flaws ...
Cybersecurity startup RAVEN.IO has raised $20 million in new funding as it looks to redefine how applications are protected in production environments. The round, led by Norwest with additional ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results