A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Three of the four vulnerabilities remained unpatched months after OX Security reported them to the maintainers.
We’re entering a new renaissance of software development. We should all be excited, despite the uncertainties that lie ahead.
Vulnerabilities in PDF platforms from Foxit and Apryse could have been exploited for account takeover, data exfiltration, and other attacks.