Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code...
A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be exploited by a threat actor...
As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat...
A medium-severity flaw has been discovered in Synology’s DiskStation Manager (DSM) that could be exploited to decipher an administrator’s password and remotely...
Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the past, and...
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions of users to...
A serious flaw has been found in WooCommerce, a popular plug-in for managing online businesses that are built on the WordPress platform....
Cloud-based repository hosting service GitHub has addressed a high-severity security flaw that could have been exploited to create malicious repositories and mount...
3 vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated threat actor to remotely execute...
GitLab has moved to address a critical security flaw in its service that, if successfully exploited, could result in an account takeover....
Cybersecurity specialists reported the detection of multiple flaws in the Mozilla Thunderbird multiplatform email client, which successful exploitation would allow malicious hackers...
Security researchers have disclosed a security issue that could have allowed attackers to weaponize the VirusTotal platform as a conduit to achieve...
Cybersecurity specialists from Juniper Networks announced the release of multiple security patches to address more than 30 flaws in their products, including...
During the November 2021 Patch Tuesday Two Active Directory domain service privilege escalation security flaws have been detected recently by Andrew Bartlett...
If exploited, an unauthenticated, remote attacker can execute code as a “nobody user” in the device meaning attacker would get root access...
Microsoft on Wednesday said it remediated a vulnerability in its Azure Container Instances (ACI) services that could have been weaponized by a...
Nginx security teams published a report related to a critical vulnerability in their DNS resolution implementation. Tracked as CVE-2021-23017, successful exploitation of...
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking...
The researcher has found a way to hack Instagram accounts in minutes. As it turns out, a new Instagram login vulnerability that...
Check Point researchers have discovered multiple security vulnerabilities in Fortnite, a massively popular online battle game, one of which could have allowed...