WordPress powers about 43% of all websites worldwide. This makes it an indispensable platform for organizations of all sizes. Unfortunately, that popularity also makes WordPress a prime target for ...
RondoDox botnet exploits the React2Shell vulnerability in Next.js, with over 90,000 exposed systems used to deploy miners and ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
A severe vulnerability affecting multiple MongoDB versions, dubbed MongoBleed (CVE-2025-14847), is being actively exploited ...
Apple’s App Store source map leak shows a preventable risk we found in 70% of organizations shipping production web apps.
React2Shell (CVE-2025-55182) is a critical vulnerability affecting the most widely used React-based services across the web ecosystem. With low exploitation complexity and publicly available PoCs, ...
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
A newly disclosed security flaw in MongoDB leading to the exposure of over 87,000 potentially vulnerable servers on the ...
AI is changing cybercrime in a big way. Autonomous AI agents could soon carry out entire attacks on their own -scanning ...
The zero-day exploitations of Ivanti's MDM platform meant unprecedented pwning of 1000s of orgs by a Chinese APT — and ...
Infosecurity has selected five of the most significant vulnerability exploitation campaigns of 2025 that led to major ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results