Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk
Critical security vulnerability has been discovered in Multer, one of the most widely used Node.js middleware packages for handling file...
Read more →Critical security vulnerability has been discovered in Multer, one of the most widely used Node.js middleware packages for handling file...
Read more →Microsoft has released an emergency update to address a critical issue affecting Windows 10 devices with specific Intel processors. The...
Read more →Significant privacy vulnerability in O2 UK’s Voice over LTE (VoLTE) implementation was recently discovered, allowing any caller to access precise...
Read more →Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system...
Read more →Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt...
Read more →Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its...
Read more →Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike beacons using Shodan and PowerShell, filling...
Read more →Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization (KASLR) on fully updated Windows 11...
Read more →Advanced persistent threat (APT) groups with ties to China have become persistent players in the cyber espionage landscape, with a...
Read more →A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting invitations from colleagues. This deceptive...
Read more →A newly identified piece of malware, dubbed the “Hannibal Stealer,” has emerged as a significant cybersecurity threat due to its...
Read more →Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated SIM swap attack that allowed him...
Read more →