We’re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary ...
Huntress reports active exploitation of Gladinet CVE-2025-11371, exposing system files and enabling remote code execution.
Ivanti EPM had been suffering from several serious vulnerabilities for months. The company wanted more than half a year to ...
Google has reported a large-scale extraction of customer data by bad actors, who it claimed are involved in an extortion ...
Cybersecurity company Imperva, which discovered and reported the problem in July 2025, described CVE-2025-53967 as a "design ...
AttackIQ has released a new emulation in response to the Oracle Security Alert Advisory detailing the CVE-2025-61882 vulnerability, which impacts Oracle E-Business Suite versions 12.2.3 through ...
The raid on Oracle E-Business Suite (EBS) likely began as early as July - about three months before any public detections - ...
Now, security researchers found that figma-developer-mpc is vulnerable to a command injection flaw that allows threat actors ...
A vulnerability in the GitHub Copilot Chat AI assistant led to sensitive data leakage and full control over Copilot’s ...
Crypto malware outsmarts antivirus. Learn how to secure your digital assets with layered defenses and smarter crypto ...
The critical vulnerability allows attacks to escape the in-memory data store’s Lua sandbox and subsequently execute arbitrary ...
New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, ...