Information security
fromThe Hacker News
9 hours agoCISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
CISA added four actively exploited vulnerabilities to its KEV catalog, including high-severity remote file inclusion, authentication bypass, access-control, and npm supply-chain compromise.