Germany’s Federal Institute for Drugs and Medical Devices (BfArM) warned Tuesday of critical vulnerabilities in Wind River’s real-time operating system VxWorks, which is used in many medical devices, ...
Palo Alto Networks Inc. today disclosed a vulnerability in its Pan-OS firewall operating system that is being actively targeted by hackers. The exploit, which is tracked as CVE-2024-3400, has received ...
Transforming a newly discovered software vulnerability into a cyberattack used to take months. Today—as the recent headlines ...
Apple's iOS 18.5 and iPadOS 18.5 updates fix more than 30 operating system vulnerabilities, including the first documented for the C1 modem. Here's what you need to know, and why you should consider ...
Copy Fail is a critical Linux vulnerability that lets any local user corrupt cached files and escalate to admin. Update your ...
For the March vulnerability scorecard, I have only two charts instead of four, since the past 3 months and the year-to-date time periods are identical. Note that each of the Linux distributions ...
A 27-year-old bug sat inside OpenBSD’s TCP stack while auditors reviewed the code, fuzzers ran against it, and the operating system earned its reputation as one of the most security-hardened platforms ...
Apple has released fixes for a total of 33 confirmed vulnerabilities in its latest update to iOS and iPadOs, the mobile operating systems that run on its iPhone and iPad lines, including two series ...
An AI agent just autonomously exploited a FreeBSD kernel vulnerability in four hours, signaling a fundamental shift in the ...
With cybersecurity threats on the rise and data breaches occurring almost every week, it’s natural to ask: What is the most secure operating system (OS)? Unfortunately, the answer isn’t ...
For the April vulnerability scorecard, we’re back to having four charts again, 2 each for server and workstation products. Note that each of the Linux distributions analyzed do not include the full ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results