Unknown attackers exploit VMware hypervisor-hijack holesBroadcom issued critical patches for VMware hypervisor vulnerabilities already exploited by criminals, highlighting the need for immediate updates.
Researchers sound alarm over hackers exploiting critical ProjectSend vulnerabilityThreat actors are exploiting a critical vulnerability in the ProjectSend file sharing application, affecting thousands of instances.Despite a year-old patch being available, 99% of ProjectSend instances remain vulnerable to exploitation.
Old Fortinet flaws under attack through new methodFortinet acknowledged new exploitation methods for previously fixed vulnerabilities, necessitating immediate attention from cybersecurity stakeholders.
Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively ExploitedThree new security vulnerabilities in Ivanti's Cloud Service Appliance are actively exploited, emphasizing the need for urgent updates to mitigate risks.
Researcher Discovers Terrifying Apple Vision Pro Hack That Can Fill Your Entire Home Office With Fearsome SpidersCybersecurity researcher found spatial computing hack allowing creepy-crawling spiders in Apple Vision Pro.
Unknown attackers exploit VMware hypervisor-hijack holesBroadcom issued critical patches for VMware hypervisor vulnerabilities already exploited by criminals, highlighting the need for immediate updates.
Researchers sound alarm over hackers exploiting critical ProjectSend vulnerabilityThreat actors are exploiting a critical vulnerability in the ProjectSend file sharing application, affecting thousands of instances.Despite a year-old patch being available, 99% of ProjectSend instances remain vulnerable to exploitation.
Old Fortinet flaws under attack through new methodFortinet acknowledged new exploitation methods for previously fixed vulnerabilities, necessitating immediate attention from cybersecurity stakeholders.
Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively ExploitedThree new security vulnerabilities in Ivanti's Cloud Service Appliance are actively exploited, emphasizing the need for urgent updates to mitigate risks.
Researcher Discovers Terrifying Apple Vision Pro Hack That Can Fill Your Entire Home Office With Fearsome SpidersCybersecurity researcher found spatial computing hack allowing creepy-crawling spiders in Apple Vision Pro.
Blockchain Protocol Nexera Suffers $1.8M Exploit, NXRA Tumbles 40%Nexera faced a $1.8 million exploit, with the attacker holding 32.5 million NXRA tokens.
Google just patched the fifth zero-day exploit for Chrome this yearGoogle issued a security update for Chrome browser to address a zero-day vulnerability, the fifth this year for the company.
Zero Day Initiative - CVE-2024-2887: A Pwn2Own Winning Bug in Google ChromeExploiting CVE-2024-2887 type confusion bug in Google Chrome and Microsoft Edge renderer process.
PHP vulnerability allows attackers to run malicious code on Windows serversA critical vulnerability in PHP allows for easy malicious code execution on Windows devices.
Kraken says security researchers tried extorting it over bugKraken exchange accuses security researchers of exploiting bug to steal millions in digital cash and extort the exchange.