The vulnerabilities disclosed in this release span multiple components of OpenSSL and affect a wide range of supported ...
In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on ...
CISA has added to the KEV catalog two Linux vulnerabilities leading to privilege escalation and authentication bypass via ...
As businesses around the world have shifted their digital infrastructure over the last decade from self-hosted servers to the cloud, they’ve benefitted from the standardized, built-in security ...
Among the most significant cybersecurity threats this year comes via the Internet of Things (IoT), and they are increasingly becoming more sophisticated and targeted. Proactive cybersecurity is needed ...
Google has released the next major version of its browser, Chrome 144. It closes several high-risk security vulnerabilities.
TP-Link has patched a serious vulnerability that can be exploited to take control of more than 32 of its VIGI camera models.
The U.S. government funding needed for non-profit research giant MITRE to develop, operate and maintain its flagship Common Vulnerabilities and Exposures Program will expire Wednesday, the company ...
And almost 50 more than last month.
Broadcom patches these router-disabling Wi-fi flaws ...
The Cybersecurity and Infrastructure Security Agency is exploring more diversified funding mechanisms to help cover the cost of a bedrock vulnerability cataloging program that’s been relied upon by ...
2025 marked yet another busy year in security, between big attacks, government shakeups, and dangerous flaws that echo of the past. The moments that defined this year were impactful but felt evenly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results