Critical75Important0Moderate0LowMicrosoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released.Microsoft patched 83 CVEs in its March 2026 Patch ...
The CVE Researcher is a multi-agent AI pipeline that automates vulnerability research, detection template generation, and exploitation analysis. Built on Google’s Agent Development Kit (ADK), it ...
Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than ...
The funding crisis that nearly shut down the global vulnerability tracking system last year has quietly been resolved, easing fears of another abrupt disruption to a cornerstone of the cybersecurity ...
An iOS warning has been issued by researchers after they discovered “a new and powerful” exploit kit targeting Apple iPhones. Here's what you need to know.
Google has issued its largest Android security update in nearly eight years, addressing 129 vulnerabilities, including a critical Qualcomm zero-day exploited in the wild. The update, with patch levels ...
AI is supercharging cloud cyberattacks - and third-party software is the most vulnerable ...
Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.
Google released a Chrome security update patching three high-severity vulnerabilities, including memory flaws that could ...
A popular WP plugin can be abused to take over websites and thousands of sites are vulnerable.
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.
According to X user Dark Web Informer, a cybercriminal known as Kamirmassabi recently posted an ad on an underground hacking forum, offering to sell a zero-day ...