News

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware ...
A fake extension for the Cursor AI IDE code editor infected devices with remote access tools and infostealers, which, in one ...
The search feature for the Windows 10 emoji panel is broken after installing the KB5062554 cumulative update released Tuesday ...
Google Gemini for Workspace can be exploited to generate email summaries that appear legitimate but include malicious ...
Hackers have started to exploit a critical remote code execution vulnerability in Wing FTP Server just one day after ...
Cybersecurity researchers discovered a vulnerability in McHire, McDonald's chatbot job application platform, that exposed the ...
Proof-of-concept exploits have been released for a critical SQLi vulnerability in Fortinet FortiWeb that can be used to achieve pre-authenticated remote code execution on vulnerable servers.
The popular WordPress plugin Gravity Forms has been compromised in what seems a supply-chain attack where manual installers ...
NVIDIA is warning users to activate System Level Error-Correcting Code mitigation to protect against Rowhammer attacks on graphical processors with GDDR6 memory.
Learn how one overlooked flaw in OpenVSX discovered by Koi Secureity could've let attackers hijack millions of dev machines ...
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability ...