A critical MongoDB flaw, CVE-2025-14847, is under active exploitation, allowing unauthenticated data leaks from 87,000+ vulnerable servers worldwide.
A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe ...
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch Tuesday – is almost ...
IBM urged customers to patch a critical authentication bypass vulnerability in its API Connect enterprise platform that could ...
The source of the account reset appears to be a site vulnerability that allows a third party to wipe accounts and change ...
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
When security vulnerabilities appear in popular frameworks, they can affect thousands of websites overnight. That’s exactly what’s happening with a newly discovered vulnerability in Next.js – one of ...
Escape From Tarkov players report full account resets after a security vulnerability. Here's everything you need to know.
Echo Software Ltd., a startup that’s using artificial intelligence agents to secure container images at the base layer, said today it has raised $35 million in an early-stage funding, just four months ...
Hackers have a list of easy ways into your IT system, and vulnerability scanners spot those loopholes so you can shut them down. We explore the best vulnerability managers. Vulnerability management ...
Cybersecurity firm Bitdefender published a report (PDF) this week detailing three security vulnerabilities it found in Wyze security cameras, leading to a flurry of criticism around both the ...
As the risks of cyberattacks that are related to security vulnerabilities continuously grow and can cause huge business damage, we see DevSecOps shifting more and more toward engineering. In this ...