News

Pwn2Own, the annual computer hacking contest, recently concluded at the OffensiveCon conference in Berlin, Germany, which was ...
The Pwn2Own Berlin 2025 hacking competition has concluded, with security researchers earning $1,078,750 after exploiting 29 ...
Pwn2Own participants demonstrated exploits against VMs, AI, browsers, servers, containers, and operating systems.
During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products ...
There was a critical gap in the Wazuh open source security platform that allowed attackers to inject their own code and take over vulnerable servers. To do this, however, they needed access to the ...
According to the advisory, an API of Cisco ISE is prone to insecure deserialization of user-supplied Java byte streams. A threat actor could exploit this by sending crafted serialized Java object ...
As far as we know, there are no active exploits in circulation at this time. The first vulnerability, CVE-2025-20124, results from insecure deserialization of user-provided Java byte streams in Cisco ...
The issue tracked as CVE-2024-50050 is due to insecure deserialization of Pickle-format Python objects in the inference server and allows an attacker to inject any code they want and remotely execute ...
However, there are two vulnerabilities in Progress Telerik UI for WPF due to insecure deserialization of data. This allows attackers to inject malicious code. The functions for RadDiagram and ...