MITRE shares 2024's top 25 most dangerous software weaknesses
MITRE has shared this year's top 25 list of the most common …
MITRE has shared this year's top 25 list of the most common …
The U.S. Justice Department has charged five suspects believed t…
Five local privilege escalation (LPE) vulnerabilities have been …
Apple released emergency security updates to fix two zero-day vu…
The U.S. Cybersecurity & Infrastructure Security Agency (CIS…
Ford is investigating allegations that it suffered a data breach…
Oracle has fixed an unauthenticated file disclosure flaw in Orac…
Hackers breached U.S. satellite maker Maxar Space Systems and ac…
Palo Alto Networks has finally released security updates for an …
Evgenii Ptitsyn, a Russian national and suspected administrator …
Broadcom warned today that attackers are now exploiting two VMw…
IT leaders know the drill—regulators and cyber insurers demand r…
Legal documents released as part of an ongoing legal tussle betw…
A critical authentication bypass vulnerability has been disclose…
A critical authentication bypass vulnerability has been discover…
Threat actors increasingly use Scalable Vector Graphics (SVG) at…
A critical authentication bypass vulnerability has been discover…
Fake AI image and video generators infect Windows and macOS with…
Fake AI image and video generators infect Windows and macOS with…
T-Mobile confirms it was hacked in the wave of recently reported…