Aqua Security’s Trivy vulnerability scanner was compromised in a supply chain attack, leading to information-stealing ...
Microsoft has confirmed that a hacker who successfully exploits a zero-day SQL vulnerability could gain system administrator privileges. Here’s how to fix it.
VEX helps public-sector security teams prioritize repairs by identifying which vulnerabilities affect their systems.
Apple fixes WebKit CVE-2026-20643 in iOS 26.3.1, macOS 26.3.2 using background patches, reducing exploit risk.
Onit Security raises $11M as it launches platform to automate vulnerability remediation processes - SiliconANGLE ...
Companies House has suspended its WebFiling service after a security flaw exposed sensitive company data including directors’ ...
Google has confirmed an emergency Chrome security update amid reports that attackers are exploiting two zero-day ...
Unified endpoint management company NinjaOne LLC today announced the launch of NinjaOne Vulnerability Management, a new ...
Microsoft Authenticator Flaw on Android, iOS Could Leak Login Codes for Millions Your email has been sent A newly discovered vulnerability in Microsoft Authenticator could expose sensitive login codes ...
A vulnerability living inside a Java-based software known as "Log4j" shook the internet this week. The list of potential victims encompasses nearly a third of all web servers in the world, according ...
A security flaw in the Ally WordPress plugin used on more than 400,000 sites could allow attackers to extract sensitive data ...
Editor’s note: This is the third in a series of columns by James Keenan, S.J., on contemporary issues in moral theology. For many years, I thought of vulnerability as about being wounded, weak, at sea ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results