A moderate-severity security vulnerability has been discovered in Apache SeaTunnel, a distributed data integration platform, affecting versions 2.3.1 through 2.3.10.
The vulnerability enables unauthorized users to execute arbitrary file read operations and deserialization attacks through the platform's RESTful API, potentially compromising system security...
IBM has disclosed multiple critical security vulnerabilities in its QRadar Security Information and Event Management (SIEM) platform that could enable attackers to gain unauthorized access to sensitive data and execute arbitrary commands on affected systems.
The vulnerabilities, published on June 19, 2025, affect QRadar...
A critical vulnerability in Tesla's Wall Connector home charging stations, proving that attackers can gain control of the devices through the charging port itself in just 18 minutes.
The attack, showcased at the Pwn2Own competition by cybersecurity firm Synacktiv, exploits a previously unknown communication...
A critical vulnerability in AI-integrated enterprise systems that allows threat actors to gain privileged access through seemingly innocent support tickets.
This attack method, dubbed "Living off AI," exploits the Model Context Protocol (MCP) implementations in platforms like Atlassian's Jira Service Management, demonstrating how the...
A vulnerability researcher has discovered a critical security vulnerability in Zyxel NWA50AX Pro WiFi 6 access points that allows unauthenticated attackers to delete arbitrary files on affected devices.
The vulnerability, discovered during a mountain vacation, represents an nday variant of previously known issues affecting...
Mobile wallets such as Apple Pay and Google Pay have revolutionized payment systems by enabling contactless transactions, but their convenience comes with hidden risks.
Security researchers have identified critical vulnerabilities in features like Apple Pay’s Express Transit mode, which bypasses authentication protocols to speed...