Redmond ships major security updates with warnings that a half-dozen Windows vulnerabilities have already been exploited in ...
Adobe documents 35 security flaws in a wide range of products, including code-execution issues in the Acrobat and Reader applications.
A UK government analysis of current best practices for OSS and supply chain risk management finds weaknesses in current ...
Cato Networks has analyzed a new IoT botnet named Ballista, which targets TP-Link Archer routers through a vulnerability.
The New York Attorney General sued National General and its parent company Allstate over two data breaches. New York Attorney General Letitia James on Monday filed a lawsuit against insurance firm ...
SAP released 21 new security notes and updated three with the release of its March 2025 vulnerability patches.
Edimax is aware that CVE-2025-1316 has been exploited in the wild, but the impacted devices were discontinued over a decade ago.
The company said the financing was provided by S Capital and investor Mike Moritz, S32, Glilot Capital Partners, and several angel investors.
South American cyberespionage group Blind Eagle has infected over 1,600 organizations in Colombia in a recent campaign.
CISA has added three critical-severity flaws in Ivanti EPM to its Known Exploited Vulnerabilities catalog. The US ...
Elon Musk claimed that the social media platform X was being targeted in a “massive cyberattack" that impacted availability.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results