Adobe Acrobat and Reader users are under attack from hackers using a zero-day vulnerability. Update within 72 hours, Adobe ...
Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.
The Google API keys, all using the ‘AIza…’ format, can be abused for retroactive privilege escalation: a key that a developer ...
The Indian government has issued a warning for Android users after multiple vulnerabilities were found across Android 14, 15, ...
CERT-In warns of a new vulnerability in Android 14-16 and Chrome, urging immediate updates. Google's patch addresses code ...
Spread the loveIn a significant cybersecurity alert, Google has released its April 2026 Android Security Bulletin, which highlights a critical vulnerability that has the potential to facilitate ...
The Indian government has issued an urgent warning for Android users due to multiple vulnerabilities affecting various ...
The U.S. State Department has officially launched the Bureau of Emerging Threats, a new unit tasked with protecting U.S.
Overview On March 11, NSFOCUS CERT detected that Microsoft released the March Security Update patch, which fixed 83 security issues involving widely used products such as Windows, Microsoft Office, ...
A critical Telnet vulnerability with a CVSS rating of 9.8 enables attackers to take full control of affected systems before authentication even kicks in, security researchers at Dream Security have ...
The official vulnerability page highlighted a flaw in the Android operating system which could be easily exploited by hackers ...
Multiple vulnerabilities in Anthropic's Claude Code could enable attackers to run harmful commands and steal API keys by hiding malicious files in a code repository, Check Point researchers found.