LATEST

The State of Trusted Open Source

The State of Trusted Open Source

The reliable source for open source, Chainguard, has a unique perspective on how contemporary businesses actually use open source software and where they encounter operational difficulties

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Two security vulnerabilities affecting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView have been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybers

Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Another n8n security vulnerability has been revealed by Cyera Research Labs. An unauthorized remote attacker can take total control of vulnerable instances thanks to this vulnerability. A

n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions

n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions

A maximum-severity security vulnerability that, if successfully exploited, could lead to authenticated remote code execution (RCE) has been reported by n8n. The vulnerability is rated 10.0

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

To fix several vulnerabilities in its Backup & Replication software, Veeam has released security updates. This article addresses a "critical" problem that might lead to remote code executi

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers

Legacy D-Link DSL gateway routers have a recently identified critical security flaw that is being actively exploited in the wild. Command injection in the "dnscfg.cgi" endpoint is the subj

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

N8n has been found to have a new critical security flaw. An authenticated attacker might be able to run arbitrary system commands on the underlying host. The vulnerability has a CVSS score

Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

A remote attacker may be able to write any file on the server due to a vulnerability in the AdonisJS package. The function "MultipartFile.move(location, options)" that permits a file to be

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

During a 14-day period in December 2025, attackers were seen sending 9,394 phishing emails to about 3,200 customers.

The misuse of Application Integration's "Send Email" task, which

The ROI Problem in Attack Surface Management

The ROI Problem in Attack Surface Management

Tools for Attack Surface Management (ASM) promise lower risk.

Typically, they provide more details.

The rationale behind the majority of ASM programs is that you cannot prote

Top 5 this week

Page 187 of 202