CVE-2025-8916

Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcpkix, bcprov, bcpkix-fips on All (API modules) allows Excessive Allocati ...

Continue Reading
New trends in phishing and scams: how AI and social media are changing the game

Introduction Phishing and scams are dynamic types of online fraud that primarily target individuals, with cybercriminals constantly adapting their tactics to deceive people. Scammers invent new method ...

Continue Reading
CVE-2023-52975

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:04+00:00| seen|...Read More ...

Continue Reading
CVE-2025-21722

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:00+00:00| seen|...Read More ...

Continue Reading
CVE-2024-47745

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:04+00:00| seen|...Read More ...

Continue Reading
CVE-2023-39189

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:04+00:00| seen|...Read More ...

Continue Reading
CVE-2024-50036

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:04+00:00| seen|...Read More ...

Continue Reading
CVE-2025-21759

creation_timestamp| type| source ---|---|--- 2025-08-13 09:00:04+00:00| seen|...Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: