A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being actively exploited in cyberattacks. With a…
Every software and operating system vendor has been implementing security measures to protect their products. This is due to the…
Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for…
CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…
Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus…
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…
The United States Director of the Cybersecurity and Infrastructure Security Agency (CISA) released a warning on Friday about the active…
In 2022, the detection of zero-day exploits in the wild decreased by 40% compared to the previous year. 41 in-the-wild…
Apple has recently released new Rapid Security Response (RSR) patches to fix a zero-day vulnerability. This vulnerability has been exploited…
Storm-0978, a threat actor, actively targeted European and North American defense and government entities in a phishing campaign. Exploiting CVE-2023-36884,…