Users could be tricked into running arbitrary code, but the issue was patched last week.
Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local ...
A vulnerability affecting the ThreatSonar Anti-Ransomware product of Taiwan-based cybersecurity firm TeamT5 has been ...
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT ...
Vulnerabilities in PDF platforms from Foxit and Apryse could have been exploited for account takeover, data exfiltration, and other attacks.
In, has issued a high-severity alert for Google Chrome users due to a major vulnerability that could allow remote code execution.
All Intel processors since 2018 are affected by Branch Privilege Injection. The image shows an example of an Intel server system. Anyone who speculates on likely events ahead of time and prepares ...
Facepalm: A widely used web technology is affected by a serious security vulnerability that can be exploited with minimal effort to compromise servers. Known as "React2Shell," the flaw may require ...
The National Institute of Standards and Technology is preparing to shift its role in the globally-adopted vulnerability ...
Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs” was published by ...
The European Union Agency for Cybersecurity (Enisa) has debuted a European Union Vulnerability Database (EUVD) to provide “aggregated, reliable and actionable” information on newly disclosed cyber ...
The UK’s National Cyber Security Centre (NCSC) has lifted the lid on a Vulnerability Research Initiative (VRI) programme designed to engage the private sector on vulnerability research and discovery ...