CISA warns of two critical Microsoft zero-day vulnerabilities, CVE-2024-43572 and CVE-2024-43573, actively exploited in the wild. CVE-2024-43572...
Exploitation
A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow attackers to...
Hackers are exploiting Docker Swarm, Kubernetes, and SSH servers, targeting Docker API vulnerabilities as the entry point...
Developers of the Linux printing system CUPS recently disclosed several vulnerabilities that could allow attackers to execute...
The newly emerged Gorilla Botnet has launched over 300,000 DDoS attacks across 100+ countries from September 4...