vulnerabilities

A study out of Germany has highlighted shortcomings in the CVSS system and the way security vulnerabilities are assessed and scored

The little-known hacking technique of subdomain hijacking is threatening thousands of sites and their visitors despite efforts to eradicate

Want to let criminals “query your databases, add/change/delete files, export data or files off your server”? No, then you should probably be paying close attention to whether you are running Adobe ColdFusion and if you are exposed...

Ivanti is warning of attacks on its MobileIron platform due to improper handling of APIs

"To the 731 people who have DVWA exposed to the internet, I apologise for CVE-2023-39848, I recommend you temporarily remove them from the internet till I can create a patch."

Researchers say that iOS can be manipulated to create a phony "airplane mode" that allows for the background transmission of data

Pre-auth RCE in Citrix ShareFile has the potential to be the next MOVEit, or Accellion, or GoAnywhere, or Aspera Faspex, or...

Two CVEs dominate attack traffic and one will look very familiar: So will six others...

Attackers dropped a webshell, collected and exfiltrated Active Directory data, then ran into some healthy obstacles...