Because it was under attack before a patch was made available by WatchGuard on December 18, this makes CVE-2025-14733 a bona ...
The latest ThreatsDay Bulletin breaks down the week’s biggest stories — rootkits evading Windows, Docker leaks, AI risks and global surveillance moves ...
Ongoing vulnerable Log4j downloads suggest the supply chain crisis wasn't the wake-up call it should have been.
Sonatype has claimed that 13% of Log4j versions downloaded this year were vulnerable to the legacy critical Log4Shell bug ...
The Apache Software Foundation has released an emergency security update today to patch a zero-day vulnerability in Log4j, a Java library that provides logging capabilities. The vulnerability, also ...
Android’s Pixnapping vulnerability has popped up in recent days, and it threatens to steal sensitive user data through malicious apps. Google has been aware of this vulnerability for a while and has ...
We may receive a commission on purchases made from links. Gemini has a big security issue. It really isn't surprising, considering we've seen security researchers take control of a smart home using ...
Unity has discovered a "major security vulnerability" affecting games made using its development tool dating back to 2017. According to a Common Vulnerabilities and Exposures (CVE) analysis, "if an ...
The American Hospital Association and FBI are urging hospitals and health systems that are Oracle customers to “immediately” fix a security flaw that cybercriminals are likely already leveraging to ...
Samsung has just issued a fix for a zero-day security vulnerability that was being used to hack into customers’ phones. The said security flaw was discovered in a software library for displaying ...
Apple Inc. has released an emergency security update to address a “zero-day” vulnerability in its ImageIO framework that has been actively exploited in the wild. A zero-day is a previously unknown ...
Apple today released new iOS 18.6.2, iPadOS 18.6.2, and macOS Sequoia 15.6.1 updates, and the software addresses a security vulnerability that is known to have been actively exploited. According to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results