Thousands of DrayTek Routers at Risk From 14 Vulnerabilities
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other…
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity Windows vulnerability abused in ransomware attacks as a…
A proof-of-concept (PoC) exploit for a Veeam Backup Enterprise Manager authentication bypass flaw tracked as CVE-2024-29849 is now publicly available, making…
Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a…
It's a tale as old as time: an old, long-since patched vulnerability that remains actively exploited.
A pervasive ClearFake campaign targeting Windows systems with Atomic Stealer has expanded its social engineering scams to MacOS users, analysts…
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and…
Over that time, the group carried multiple tests to see if the exploit worked and to identify potential victims. It…
Hackers are actively targeting a critical flaw in YITH WooCommerce Gift Cards Premium, a WordPress plugin used on over 50,000…
The latest bypass for Apple's application-safety feature could allow malicious takeover of Macs.