KEV Collider combines data from multiple open-source vulnerability frameworks to help cybersecurity teams assess which issues ...
Key cyber updates on ransomware, cloud intrusions, phishing, botnets, supply-chain risks, and nation-state threat activity.
Rapid7 links China-linked Lotus Blossom to a 2025 Notepad++ hosting breach that delivered the Chrysalis backdoor via hijacked updates, fixed in v8.8.9 ...
AI-powered penetration testing is an advanced approach to security testing that uses artificial intelligence, machine learning, and autonomous agents to simulate real-world cyberattacks, identify ...
This repository provides a daily, automatically updated JSON dataset detailing which exploits within the Metasploit Framework are associated with specific Common Vulnerabilities and Exposures (CVE) ...
Security chief says criminals are already automating workflows, with full end-to-end tools likely within years ...
This is a comprehensive penetration testing automation suite designed specifically for testing the Metasploitable2 vulnerable VM in a controlled lab environment. The suite orchestrates a complete ...
Fresh attacks targeted three VMware ESXi vulnerabilities that were disclosed in March 2025 as zero-days. A Chinese threat actor built an exploit for three VMware ESXi vulnerabilities that were patched ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results