A critical MongoDB flaw, CVE-2025-14847, is under active exploitation, allowing unauthenticated data leaks from 87,000+ ...
A critical CVSS 10.0 vulnerability in n8n allows unauthenticated attackers to read files, bypass authentication, and gain ...
Cyera researchers detail critical 'Ni8mare' vulnerability allowing full takeover of n8n instances - SiliconANGLE ...
The Register on MSN
An early end to the holidays: 'Heartbleed of MongoDB' is now under active exploit
You didn't think you'd get to enjoy your time off without a major cybersecurity incident, did you? A high-severity MongoDB ...
Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
The telemedicine provider Dr. Ansay has experienced another security vulnerability. This endangered hundreds of thousands of ...
The flaw ‘broke one of the fundamental things about the cloud – that you can’t access another person’s data,’ says security provider Wiz. Cloud security provider Wiz disclosed Thursday that earlier ...
A database used to track NYPD officer profiles contained security flaws that would have allowed a skilled-enough hacker to add, remove or modify data entries and insert potentially malicious files ...
Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like the one that ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More GitHub is opening the GitHub Advisory Database to community submissions, ...
After the CVE’s program’s near-death experience in April, might the Europeans be looking for a more reliable long-term system? From this week, the global technology industry has a new database to ...
After the U.S. government initially cut its funding of the CVE database, used to track security vulnerabilities in operating systems and software, CISA has said it will continue to be funded for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results