Fortinet warns of active attacks on a five-year-old vulnerability in FortiOS. The vulnerability makes it possible to bypass ...
Those responsible for a MongoDB instance cannot rest easy: an exploit for a critical vulnerability makes upgrades even more ...
A critical MongoDB flaw, CVE-2025-14847, is under active exploitation, allowing unauthenticated data leaks from 87,000+ ...
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
According to Lane Thames, principal cybersecurity researcher at Eden Prairie, MN-based cybersecurity firm Fortra, the effects of zero-day exploits on companies can be massive, and are usually monetary ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimbra in an attempt to remotely execute malicious commands that install a backdoor, researchers warn. The ...
SafeBreach researchers developed a zero-click PoC exploit that crashes unpatched Windows Servers using the Windows ...
New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities ...
With attacks on the critical firewall vulnerability, WatchGuard joins a list of edge device vendors whose products have been ...
ESET researchers discovered a previously unknown vulnerability in Mozilla products, exploited in the wild by Russia-aligned group RomCom. This is at least the second time that RomCom has been caught ...
Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs Your email has been sent Volt Typhoon, a Chinese state-sponsored hacking group, has been caught ...