An 18-year-old flaw in the NGINX open-source web server, discovered using an autonomous scanning system, can be exploited for ...
A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by ...
Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend ...
Hackers allegedly used AI to build a zero-day tool that bypasses 2FA, raising fresh concerns about automated cyber threats ...
Linux users have been bitten by yet another vulnerability that gives containers and untrusted users the ability to gain root ...
What this means in practice is that when admins engage with the authentication process, they need to do so using ...
Weekly cybersecurity recap covering zero-days, malware, phishing, supply chain attacks, cloud threats, AI security risks, and ...
Cybersecurity Researcher Jeremiah Fowler uncovered a data leak involving what appears to be stalkerware or spyware used to ...
A single malformed web request is all it takes. On May 4, 2026, the Apache Software Foundation quietly filed a vulnerability ...
Apple's urgent iPhone fix: A multi‑stage WebKit exploit chain can compromise iPhones simply by loading a malicious page, leading Apple to push an immediate update. SharePoint patch gap: Internet scans ...
After the CopyFail vulnerability gave root access from any user on almost all distributions last week, this week we’ve got DirtyFrag. This chains the vulnerability in CopyFail (xfrm-ESP) and ...