Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127, was ...
In a rapidly evolving cybersecurity landscape, the proliferation of ransomware continues to pose significant challenges to organizations worldwide. Recently, a new strain known as Akira Ransomware has ...
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT ...
Google has released an emergency security update for its Chrome browser after detecting active exploitation of a critical ...
Ex-L3Harris employee sentenced to 7 years for selling 8 zero-days to Russian broker; U.S. sanctions Operation Zero and associates.
A sweeping cyber espionage campaign exploiting a newly discovered zero-day vulnerability in self-hosted Microsoft (MSFT) SharePoint servers compromised nearly 100 organizations, researchers at Eye ...
Dell RecoverPoint zero-day CVE-2026-22769 exploited since 2024 to gain root access and deploy GRIMBOLT, BRICKSTORM backdoors in targeted attacks.
On the second day of Pwn2Own Automotive 2026, security researchers collected $439,250 in cash awards after exploiting 29 unique zero-days. The Pwn2Own Automotive hacking contest focuses on automotive ...
Microsoft Office is victim to a critical zero-day exploit, and Russian hacker groups are already weaponizing it in destabilizing efforts toward the Ukrainian government. While Westerners and most ...
The security vendor said that exploits of a previously disclosed vulnerability are behind a ‘small’ number of cases of compromised Gen 7 firewalls. SonicWall reported that exploitation of a previously ...
The Register on MSN
Infosec exec sold eight zero-day exploit kits to Russia, says DOJ
PLUS: Fake ransomware group exposed; EC blesses Google's big Wiz deal; Alleged sewage hacker cuffed; And more Infosec in Brief The former General Manager of defense contractor L3Harris’s cyber ...
Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These attacks exploit vulnerabilities that are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results