A severe vulnerability affecting multiple MongoDB versions, dubbed MongoBleed (CVE-2025-14847), is being actively exploited ...
UEFI firmware flaws in certain ASRock, ASUS, GIGABYTE, and MSI motherboards allow early-boot DMA attacks before OS security ...
Motherboards from several major vendors are affected by a vulnerability that can allow a threat actor to conduct early-boot ...
An unauthenticated user can execute the attack, and there’s no mitigation, just a hotfix that should be applied immediately.
Microsoft claimed to have fixed security vulnerability CVE-2025-60718, but it can still be exploited by hackers according to ...
Russian hackers favoring misconfigurations over the exploitation of vulnerabilities for gaining access to critical ...
European regulators have ordered airlines to take immediate action on Airbus A320 Family aircraft after an investigation linked a recent uncommanded pitch-down event to a potential fault in a key ...
A vulnerability in DoorDash's systems could allow anyone to send "official" DoorDash-themed emails right from company's authorized servers, paving a near-perfect phishing channel. DoorDash has now ...
Surge in vulnerabilities and exploits leaving overloaded security teams with little recourse but to embrace risk-based approaches to patching what they can. Enterprise attack surfaces continue to ...
As cyber threats grow more sophisticated by the day, UC Riverside researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security ...
Business has slowed considerably in the vulnerability management market segment, yet there are more vulnerabilities to contend with than ever before. When security mainstays experience the same harsh ...