Update, March 22, 2025: This story, originally published March 20, has been updated with expert commentary from infosecurity professionals regarding the latest critical Google Chrome vulnerability ...
Microsoft said it observed a threat actor known as Storm-2460 abuse a use after free flaw in Windows Common Log File System Driver The flaw is used to deploy PipeMagic, which is then used to deliver ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Updated October 20 with details of a high-priority security ...
Google has released an important update for Chrome, fixing several vulnerabilities in new Chrome versions 138.0.7204.157/158 for Windows and macOS and 138.0.7204.157 for Linux. According to Google, ...
CISA issued an urgent warning about a critical Apple WebKit zero-day vulnerability actively exploited in attacks..
Google has fixed several vulnerabilities in Chrome versions 138.0.7204.183/184 for Windows and macOS and 138.0.7204.183 for Linux. According to Google, none of the vulnerabilities have been exploited ...
Grafana Labs has addressed four Chromium vulnerabilities in critical security updates for the Grafana Image Renderer plugin and Synthetic Monitoring Agent. Although the issues impact Chromium and were ...
OpenAI’s o3 AI model has achieved a cybersecurity first: discovering a zero-day vulnerability (CVE-2025-37899) in the Linux kernel’s SMB implementation. This critical “use-after-free” bug was verified ...
Today is Microsoft's October 2025 Patch Tuesday, which includes security updates for 172 flaws, including six zero-day vulnerabilities. This Patch Tuesday also addresses eight "Critical" ...
The Linux kernel, foundational for servers, desktops, embedded systems, and cloud infrastructure, has been under heightened scrutiny. Several vulnerabilities have been exploited in real-world attacks, ...
Microsoft is finishing 2025 by issuing only 57 patches for Windows and other products for December Patch Tuesday, but one vulnerability is already being exploited as a zero day and needs to be ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results