An Adobe zero-day used since December 2025 is now patched ...
CVE-2026-33032 exposes nginx-ui to unauthenticated takeover via MCP endpoint, impacting 2,600+ instances with active ...
Compare the best DAST tools in 2026. Our buyer's guide covers 10 dynamic application security testing solutions, key features ...
Axios, a widely used JavaScript library, is affected by a new critical vulnerability that enables attackers to chain exploits ...
An audit has found Google, Microsoft, and Meta have ignored privacy opt-out signals on most California websites, setting ad ...
The iot technology stack involves several layers, starting with devices and moving to cloud services, data processing, and ...
According to Socket, the extensions (complete list here) are published under five distinct publisher identities – Yana ...
More than 100 malicious extensions in the official Chrome Web Store are attempting to steal Google OAuth2 Bearer tokens, ...
Email subscription bombing (also known as subscription flooding or email spam bombing) is an attack technique that overwhelms ...
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant ...
Leeron is a New York-based writer who specializes in covering technology for small and mid-sized businesses. Her work has been featured in publications including Bankrate, Quartz, the Village Voice, ...