This section has all the latest news and information about exploits, such as newly found security holes, hacks, patches, and ways to protect against them. We go into great depth about how these exploits work, what damage they might do, and what companies do to protect themselves from them. Know about the newest dangers and ways to protect yourself from them in the world of cybersecurity.
A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for Git version control in pure…
Over the past year, malicious actors have been abusing OAST services for data exfiltration, C2 channel establishment, and multi-stage attacks…
The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability. Exploitable…
A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been publicly disclosed by an anonymous user…
GFI Software's Kerio Control, a popular UTM solution, was found to be vulnerable to multiple HTTP Response Splitting vulnerabilities, which…
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This…
EDRSilencer, a red team tool, interferes with EDR solutions by blocking network communication for associated processes using the WFP, which…
A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being actively exploited in cyberattacks. With a…
Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability was found in Foxit PDF Reader,…