Vulnerabilities in PDF platforms from Foxit and Apryse could have been exploited for account takeover, data exfiltration, and other attacks.
The US government has continued to make drastic cuts to budgets and personnel, but one cybersecurity service has at least temporarily avoided the chop. The Common Vulnerabilities and Exposures ...
Four serious new vulnerabilities affect Microsoft Visual Studio Code, Cursor and Windsurf extensions, three of which remain ...
European Vulnerability Database is Live: What This ‘Essential Tool’ Offers Security Experts Your email has been sent The announcement comes after concerns that the US government would stop funding the ...
After the U.S. government initially cut its funding of the CVE database, used to track security vulnerabilities in operating systems and software, CISA has said it will continue to be funded for ...
Security researcher demonstrates how attackers can hijack Anthropic’s file upload API to exfiltrate sensitive information, even with network restrictions enabled. A newly disclosed vulnerability in ...
Earlier this month, the now viral social network Moltbook exposed 1.5 million API authentication tokens and 35,000 email addresses within days of launch. The cause: a single misconfigured database ...
Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.
After the CVE’s program’s near-death experience in April, might the Europeans be looking for a more reliable long-term system? From this week, the global technology industry has a new database to ...
Google has released Chrome 145.0.7632.116/117 addressing security flaws that pose a threat of system takeover. Now, all users must make an important update decision.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results