A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to malicious…
Ransomware is used by hackers to abuse victims' data, locking it until a ransom is paid. This method of cyber…
Hackers use packers maliciously to make their code difficult to recognize, as most antivirus programs are coded to be able…
A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned…
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit…
A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which has been termed "Linguistic Lumberjack" (CVE-2024-4323).…
Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port…
Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a…
Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789. These vulnerabilities were associated with Command Injection on Linksys routers.…
The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype…