Bug bounties have become a staple of the cyber security toolkit, offering researchers a way to get paid to find and report ...
CVE-2021-22681, an old vulnerability affecting ICS products from Rockwell Automation, has been exploited in attacks.
Google and Qualcomm have tag-teamed a serious vulnerability in the chipsets used in Android mobile devices, which has been ...
An SQL injection vulnerability in Ally, a WordPress plugin from Elementor for web accessibility and usability with more than 400,000 installations, could be exploited to steal sensitive data without ...
A new report out today from artificial intelligence security startup Cyata Security Ltd. details a recently uncovered critical vulnerability on langchain-core, the foundational library behind ...
The now-patched flaw is the latest in a growing string of security issues with the viral AI tool, which has seen rapid adoption among developers.
At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017.
Research from a cryptocurrency firm has identified a vulnerability affecting Android smartphones with MediaTek chipsets, enabling hackers to access devices in under a minute. This flaw targets the ...
The U.S. federal government is rethinking how to support its globally adopted vulnerability tracking ecosystem after years of backlogs, funding scares and growing doubts about whether the existing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results