English
Telegram faces a critical zero-click vulnerability that could allow attackers to compromise user devices without any interaction. With no patch yet available, experts warn users to stay vigilant.
A once-overlooked F5 BIG-IP APM flaw has been reclassified as a remote code execution vulnerability, following active exploitation. Federal agencies and enterprises face mounting pressure to patch as attackers up their game.
Internet-connected cameras have become espionage tools in global conflicts, with nation-states hijacking them for surveillance and targeted attacks. Learn how this threat evolved and what organizations can do to protect themselves.
Critical flaws in BIND 9 put global DNS infrastructure at risk, enabling attackers to crash servers, bypass security controls, and degrade internet services. Immediate patching is urged.
A newly discovered vulnerability in StrongSwan VPN software puts encrypted communications at risk. Security experts urge immediate patching and vigilance as the open-source tool faces scrutiny.
CISA has added a critical vulnerability in Aqua Security’s Trivy scanner to its KEV catalog, highlighting active exploitation and exposing significant risks to software supply chains and CI/CD pipelines.
TP-Link rushed out fixes for major Archer router flaws after researchers exposed authentication bypass, command injection, and encryption weaknesses. The incident highlights the urgent need for router security vigilance.
A newly revealed flaw in Kea DHCP servers could let attackers remotely crash essential network services, threatening widespread outages across enterprise and ISP environments. Here’s what you need to know.
A critical stack overflow flaw in Kea DHCP lets unauthenticated attackers remotely crash essential network services. Find out which versions are at risk, patching instructions, and why this vulnerability is a wake-up call for network security.
A severe flaw in Windows Error Reporting let attackers jump from user to SYSTEM privileges, forcing Microsoft to remove the vulnerable feature outright. Here’s how the bug worked, why it was so dangerous, and what defenders need to know.