Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at ...
Threat actors are exploiting CVE-2025-53521, a critical F5 BIG-IP vulnerability that has been reclassified as a remote code execution issue.
Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for ...
Fortinet disclosed that it has observed exploitation of a vulnerability in its FortiClient EMS (Enterprise Management Server) ...
Researchers found a high-severity bug in Chrome's Gemini feature. It grants extensions the ability to spy on you or steal your data. Update now. A new vulnerability impacting Google Chrome's Gemini ...
For the past two years, cybersecurity teams have been facing an explosion of publicly reported vulnerabilities in software and hardware products, making it increasingly challenging to prioritize patch ...
Time and again, dangerous security vulnerabilities are discovered in the hardware of certain manufacturers. Lenovo AIO PCs landed in the news as recently as last week, and now Dell laptop owners need ...
Recent vulnerabilities in Microsoft Azure and Bing have been identified, potentially allowing hackers to gain elevated ...
The UK’s National Cyber Security Centre (NCSC) has lifted the lid on a Vulnerability Research Initiative (VRI) programme designed to engage the private sector on vulnerability research and discovery ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results