Infosecurity has selected five of the most significant vulnerability exploitation campaigns of 2025 that led to major ...
Tens of thousands of internet-exposed MongoDB databases are at risk as attackers actively target a critical vulnerability in ...
The CISA KEV catalog was expanded with 245 vulnerabilities in 2025, including 24 flaws exploited by ransomware groups.
Microsoft (NASDAQ:MSFT) said Chinese have been exploiting vulnerabilities in its SharePoint software, which led to breaches recently. Microsoft said it has observed two named Chinese nation-state ...
Those responsible for a MongoDB instance cannot rest easy: an exploit for a critical vulnerability makes upgrades even more ...
A vulnerability in ChatGPT that was identified last year is being used by would-be cyberattackers to target security flaws in artificial intelligence systems, with the healthcare industry one of the ...
Threat actors, likely supported by the Russian government, hacked multiple high-value mail servers around the world by exploiting XSS vulnerabilities, a class of bug that was among the most commonly ...
In the UniFi Protect Application, attackers can exploit vulnerabilities for unauthorized access to cameras and DoS attacks.
CISA has warned U.S. federal agencies to secure their networks against attacks exploiting a high-severity vulnerability in NAKIVO's Backup & Replication software. Tracked as CVE-2024-48248, this ...
Increased hacker activity has been observed in attempts to compromise poorly maintained devices that are vulnerable to older security issues from 2022 and 2023. Threat monitoring platform GreyNoise is ...