Explore

vulnerability ×
  • screenshot

    Russian Military Used Hacked Cameras in Missile Strike on Capital

    Russia hacked video surveillance cameras as part of a massive air attack on Kyiv, according to...

  • screenshot

    Hackers exploit Aiohttp bug to find vulnerable networks

    The ransomware actor 'ShadowSyndicate' was observed scanning for servers vulnerable to CVE-2024-23334, a directory traversal vulnerability...

  • screenshot

    Google paid $10M in bug bounty rewards last year

    Google awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly...

  • screenshot

    QNAP warns of critical auth bypass flaw in its NAS devices

    QNAP warns of vulnerabilities in its NAS software products, including QTS, QuTS hero, QuTScloud, and myQNAPcloud,...

  • screenshot

    White House urges devs to switch to memory-safe programming languages

    The White House Office of the National Cyber Director (ONCD) urged tech companies today to switch...

  • screenshot

    LXer: Shim vulnerability exposes most Linux systems to attack

    Published at LXer: This low-level software is the glue that enables Linux to run on Secure...

  • screenshot

    Leaky Vessels flaws allow hackers to escape Docker, runc containers

    Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the...

  • screenshot

    iPhone Triangulation attack abused undocumented hardware feature

    The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips...