News

Alongside new iPhones, Apple released a new security architecture on Tuesday: Memory Integrity Enforcement aims to eliminate ...
As hackers exploit a high-severity vulnerability in SAP’s flagship Enterprise Resource Planning software product, the ...
Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit ...
WhatsApp has patched a security vulnerability that allowed sophisticated attacks against the Apple devices of “specific ...
A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in the wild. The command injection vulnerability, tracked as ...
A critical SAP S/4HANA code injection flaw tracked as CVE-2025-42957 and allowing full system takeover has been exploited in ...
Microsoft fixed 80 vulnerabilities in September's Patch Tuesday update across its Windows, Office, and Edge products.
Researchers have earned significant rewards from Google for reporting two serious vulnerabilities found in the Chrome web ...
Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for ...
“While widespread exploitation has not yet been reported,” Germany-based SecurityBridge said in a blog on Thursday, it has ...
Beyond the two exploited zero-days, this month's Android update tackles four critical vulnerabilities. The most severe is CVE ...
Web application security is the practice of protecting websites, online services, and applications from cyber threats that ...