News

A Chinese state-sponsored hacking group known as Murky Panda (Silk Typhoon) exploits trusted relationships in cloud ...
Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed ...
A recent paper published in Computer Networks, however, shows that this might no longer be the case. Exploits could also be automatically generated by leveraging large language models (LLMs), such ...
Apple rushes emergency patches for zero-day image exploit letting attackers hijack iPhones and Macs through malicious photos ...
Hackers are likely starting to exploit CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows remote execution. The security issue has ...
Many hackers are opportunistic and often attempt to exploit security gaps to launch an attack days before a vulnerability is disclosed. According to a new report published on July 31 by GreyNoise, ...
VulnCheck launched its first formal partner program Wednesday to drive the next phase of growth for its exploit intelligence offering, which aims to provide greater automation for cyber defense, ...
Microsoft Corp. warned that hackers are actively targeting customers of its document management software SharePoint, with security researchers flagging the risk of potentially widespread breaches ...
A cyber-espionage campaign centered on vulnerable versions of Microsoft's server software now involves the deployment of ransomware, Microsoft said in a late Wednesday blog post.