Hackers are exploiting critical-severity vulnerabilities affecting multiple Fortinet products to get unauthorized access to ...
Over the past week, enterprise security teams observed a combination of covert malware communication attempts and aggressive probing of publicly exposed infrastructure. These incidents, detected ...
A series of actively exploited zero-day vulnerabilities affecting Windows, Google Chrome, and Apple platforms was disclosed in mid-December, according to The Hacker News, reinforcing a persistent ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence ...
Security researchers have found a chain of exploits that allows the bootloader of the Chromecast with Google TV (HD) to be unlocked. Worryingly, this exploit chain allows the device to report a ...
A security vulnerability has been discovered in AMD Ryzen Zen 2-based processors which could leave systems open to data theft, password leaks and system attacks. More worryingly, attacks can be ...
Decentralized U.S. dollar stablecoin protocol Raft claims that despite multiple security audits, the firm still suffered a security exploit leading to the loss of $6.7 million last week. According to ...
One of the biggest buyers of iOS zero-day exploits says the market is flooded with new iPhone bugs due to weakened security components in Safari and iMessage. Zerodium, which pays $2 million for iOS ...
HD Moore, creator of the open-source Metasploit vulnerability testing tool, posted the code online and said it exploits a buffer overflow flaw in libtiff, the image rendering library that's used by ...
Haifei Li, a principal vulnerability researcher at Check Point Software Technologies Ltd., examines the universe of Microsoft Outlook exploits in a new blog post this week that has lessons for users ...