The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Google Chromium vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning that the vulnerability is being actively exploited in the wild.
The vulnerability, tracked as CVE-2025-6558, affects the ANGLE and GPU components of...
A damaging cyber-intrusion has exposed sensitive data within networks that manage elements of the United States’ nuclear weapons enterprise.
Investigators say a previously unknown SharePoint 0-day exploit granted adversaries privileged access to document repositories that house maintenance schedules, engineering drawings, and parts-tracking records for...
A critical security vulnerability in the widely-used form-data JavaScript library has been disclosed, potentially exposing millions of applications to sophisticated code injection attacks.
The vulnerability, tracked as CVE-2025-7783 and published by prominent JavaScript developer Jordan Harband, exploits predictable random number generation to allow attackers...
A critical vulnerability in PHP's PDO (PHP Data Objects) library has been discovered that allows attackers to perform SQL injection attacks even when applications use prepared statements and proper escaping techniques.
Security researcher hashkitten revealed this technique during the DownUnderCTF competition, demonstrating how PDO's...
A configuration vulnerability in Microsoft's AppLocker security feature that could potentially allow certain applications to bypass system restrictions.
The discovery centers around a seemingly minor numerical discrepancy in Microsoft's official documentation that creates an exploitable gap in the application control system, though the researchers...
A critical security vulnerability has been discovered in Livewire v3, a popular full-stack framework for Laravel that enables developers to build dynamic user interfaces without extensive JavaScript knowledge.
The vulnerability, designated as CVE-2025-54068 and tracked as GHSA-29cq-5w36-x7w3, allows unauthenticated attackers to achieve remote command...