Security holes in Plex Media Server allow attackers to gain unauthorized access. Updates are pending. In August, developers ...
A critical MongoDB flaw, CVE-2025-14847, is under active exploitation, allowing unauthenticated data leaks from 87,000+ ...
A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe ...
Common vulnerabilities and exposures (CVEs) include all types of subversive entry-points discovered in programs, along with a ...
December 2025, the RondoDox botnet operators have been targeting Next.js servers impacted by the React2Shell vulnerability.
Hackers are exploiting CVE-2025-14847, aka MongoBleed, a MongoDB vulnerability, to leak sensitive information from server ...
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch Tuesday – is almost ...
Password theft, by the billion, has been in the news recently, as has Microsoft’s desire to replace the security measure for all users. Security experts have now warned that a vulnerability impacting ...
As the risks of cyberattacks that are related to security vulnerabilities continuously grow and can cause huge business damage, we see DevSecOps shifting more and more toward engineering. In this ...
Cybersecurity firm Bitdefender published a report (PDF) this week detailing three security vulnerabilities it found in Wyze security cameras, leading to a flurry of criticism around both the ...
Hackers have a list of easy ways into your IT system, and vulnerability scanners spot those loopholes so you can shut them down. We explore the best vulnerability managers. Vulnerability management ...
Healthcare IT teams that are familiar with technical debt will understand why security debt is an equally important concern.