A one-click vulnerability in the Telegram app for Android and iOS can leak users’ real IP addresses, bypassing the built-in ...
Tech leaders detail overlooked human behaviors that undermine organizational cybersecurity, from verification lapses to ...
NASA acknowledges independent researcher Hasan İsmail Gülkaya for discovering vulnerabilities through its Vulnerability Disclosure Program, highlighting the importance of ethical hacking in ...
Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest ...
A critical CVSS 10.0 vulnerability in n8n allows unauthenticated attackers to read files, bypass authentication, and gain ...
The CISA KEV catalog was expanded with 245 vulnerabilities in 2025, including 24 flaws exploited by ransomware groups.
A critical MongoDB flaw, CVE-2025-14847, is under active exploitation, allowing unauthenticated data leaks from 87,000+ ...
Expect significant innovations in AI-driven cyber tools and a closer convergence between cybersecurity and geopolitics, they ...
The Department of Defense Cyber Crime Center, known as the DC3, is expanding to address the increase in cyber attacks and vulnerabilities. The DC3’s Vulnerability Disclosure Program is expanding ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
Since issuing cybersecurity vulnerability tests within HHS networks, the Office of Inspector General is instating ongoing cybersecurity audits, according to Fedscoop. During fiscal year 2016-17, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results