Ivanti misdiagnoses a remote code execution vulnerability and Mandiant reports that Chinese hackers are launching in-the-wild exploits.
An unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data.
The notorious cybercrime group Hunters International is dropping ransomware to focus on data theft and extortion.
Less than two dozen cybersecurity merger and acquisition (M&A) deals were announced by security firms in March 2025.
GitHub has announced new capabilities to help organizations and developers keep secrets in their code protected.
Two CVEs now exist for an actively exploited CrushFTP vulnerability and much of the security industry is using the ‘wrong one ...
Cisco fixes two high-severity denial-of-service vulnerabilities in Meraki devices and Enterprise Chat and Email.
Google’s patches for Quick Share for Windows vulnerabilities leading to remote code execution were incomplete and could be easily bypassed.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results