Those responsible for a MongoDB instance cannot rest easy: an exploit for a critical vulnerability makes upgrades even more ...
A severe vulnerability affecting multiple MongoDB versions, dubbed MongoBleed (CVE-2025-14847), is being actively exploited ...
Flow Blockchain moves toward a full restart after a $3.9 million exploit, with user funds safe and recovery underway.
Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimbra in an attempt to remotely execute malicious commands that install a backdoor, researchers warn. The ...
With attacks on the critical firewall vulnerability, WatchGuard joins a list of edge device vendors whose products have been ...
Researchers discovered a type of issue that is called a cross site scripting vulnerability (XSS). It can generally involve a compromised input interface. So anywhere that a user can input and upload ...
Attackers are actively exploiting a critical vulnerability in a WordPress plug-in that’s used by a large number of themes, researchers from two security companies warned Wednesday. The vulnerability ...
According to experts tracking the issue, a working exploit for CVE-2021-22005 -- a vulnerability with VMware vCenter -- has been released and is reportedly being used by threat actors. A roundup of ...
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner. At the beginning of ...
Automated probes for servers containing a severe vulnerability in SAP software have been detected a week after a working exploit was published online. The vulnerability, tracked as CVE-2020-6207, is a ...
Attackers are exploiting a zero-day vulnerability in Google’s Android mobile operating system that can give them full control of at least 18 different phone models, including four different Pixel ...