A critical vulnerability in Citrix NetScaler devices, dubbed "CitrixBleed 2," has become a prime target for cybercriminals following the public disclosure of exploitation techniques.
The flaw, identified as CVE-2025-5777, was initially reported to Citrix customers on June 17, 2025, and has since sparked widespread...
A sophisticated method to bypass safety mechanisms in Grok-4, one of the latest large language models, by combining two previously separate attack techniques known as Echo Chamber and Crescendo.
The hybrid approach achieved significant success rates in manipulating the AI system to produce harmful...
WinRAR, the ubiquitous Windows file-archiving utility installed on hundreds of millions of systems worldwide, is once again in the cross-hairs of cybercriminals.
A threat actor using the moniker “zeroplayer” has surfaced on a prominent dark-web marketplace, advertising what they claim is a previously unknown...
Security researchers have uncovered a widespread vulnerability affecting hundreds of Laravel web applications globally, with the potential for remote code execution attacks.
The vulnerability stems from improper handling of Laravel's APP_KEY, a critical 32-byte encryption key that serves as the foundation for the framework's...
Palo Alto Networks has disclosed a privilege escalation vulnerability affecting its Autonomous Digital Experience Manager software on macOS systems, highlighting ongoing security challenges in enterprise endpoint management solutions.
The vulnerability, designated CVE-2025-0139, was published on July 9, 2025, and allows locally authenticated users with...
Cybersecurity researcher Jeremiah Fowler has discovered a significant data exposure affecting a Texas-based tax credit consulting firm, which has revealed the sensitive personal information of nearly 250,000 individuals.
The unprotected database, containing 245,949 records totaling 286.9 GB of data, was left accessible to anyone...