Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
Google's latest threat report warns that third-party tools are now prime targets for attackers - and businesses have only days to prepare defenses.
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation.
Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
A red-team experiment found an AI agent could autonomously exploit a vulnerability in McKinsey’s internal chatbot platform, exposing millions of conversations before the issue was patched.
"Claude Opus 4.6 discovered 22 vulnerabilities over the course of two weeks. Of these, Mozilla assigned 14 as high-severity vulnerabilities—almost a fifth of all high-severity Firefox vulnerabilities ...
An iOS warning has been issued by researchers after they discovered “a new and powerful” exploit kit targeting Apple iPhones. Here's what you need to know.
NVIDIA Inception Program's NDAY Security Enhances Exploitability Products with CrowdFense Vulnerability Intelligence ...
CVE-2021-22681, an old vulnerability affecting ICS products from Rockwell Automation, has been exploited in attacks.
Flashpoint has announced the release of its 2026 Global Threat Intelligence Report (GTIR), providing security leaders from threat intelligence and vulnerability management teams to physical security ...
A serious Windows vulnerability is reportedly being sold on the dark web for $220,000, highlighting the growing market for cyberattack tools and exploits.
Google Cloud report details a sharp rise in attackers exploiting software vulnerabilities, including React2Shell ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results