GitLab releases security updates addressing several critical vulnerabilities, urging all users to upgrade immediately. This release is crucial for ensuring…
Jenkins has been discovered with a critical vulnerability that is associated with arbitrary code execution that threat actors can exploit…
Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the…
Hackers exploit UEFI flaws to gain unauthorized access to a system's firmware, enabling them to implant persistent malware or manipulate…
A cryptocurrency-related phishing scam that uses malware called a drainer is one of the most widely used tactics these days. From…
Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…
Hackers use YouTube channels to deliver malware due to the huge user base of the platform. By using YouTube channels,…
Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti…