Security researchers at JFrog have identified three large-scale campaigns targeting Docker Hub with repositories that did not contain container images…
Author: sysops
The CIS Benchmarks™ play a critical role in hardening software against evolving cyber threats and ensuring compliance with industry regulations.…
Threat actors have claimed to have discovered a 0-day vulnerability in Zyxel VPN devices. This revelation was made public through…
Vulnerability exploits are the third most common way that cybercriminals gain access to target organizations, surpassed only by credential stealing…
In a significant update from the Linux kernel’s security team, a critical vulnerability identified as CVE-2024-26925 has been addressed to…
A significant security flaw has been identified in Apple’s Safari browser that could potentially expose iPhone users in the European…
Tanto Security has disclosed critical vulnerabilities in the widely-used open-source service Judge0, which could allow attackers to perform a sandbox…
QNAP has disclosed multiple vulnerabilities across its network-attached storage (NAS) systems, which could allow hackers to take control of affected…
A new vulnerability has been discovered in Telegram, allowing a threat actor to hijack a Telegram user session via XSS…
Researchers discovered a vulnerability in an archived Apache project, highlighting the risk of using outdated third-party dependencies, where attackers can…