A decade-old critical security vulnerability affects over 800,000 internet-exposed telnet servers, with reports of active ...
CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was previously used in zero-day attacks.
Powered by real-world threat intelligence and advanced adversarial research, Pillar leverages insights from analyzing millions of AI interactions, scanning tens of thousands of repositories, and ...
Baddies are exploiting a critical bug in React Native's Metro development server to deliver malware to both Windows and Linux ...
Attackers breached eScan antivirus update infrastructure to push malicious updates, deploying persistent malware on ...
MicroWorld Technologies, the maker of the eScan antivirus product, has confirmed that one of its update servers was breached and used to distribute an unauthorized update later analyzed as malicious ...
Hackers are on the hunt for open telnet ports in servers after discovering that a version of the legacy client-server application protocol is vulnerable to an ...
Threat actors could use prompt injection attacks to take advantage of three vulnerabilities in Anthropic’s official Git MCP server and cause mayhem with AI systems. This alert comes from researchers ...
Three security vulnerabilities in the official Git server for Anthropic's Model Context Protocol (MCP), mcp-server-git, have been identified by cybersecurity researchers. The flaws can be exploited ...
MongoBleed (CVE-2025-14847) leaks sensitive data via uninitialized heap memory exploitation Roughly 87,000 exposed MongoDB instances vulnerable; most located in U.S., China, and Germany Patch released ...
Cloud environments are dynamic by design. New identities are created, policies adjusted, and workloads deployed or retired several times a day. Yet many organizations continue to rely on scanning and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results