This week’s cybersecurity recap highlights key attacks, zero-days, and patches to keep you informed and secure.
Attackers are actively exploiting a critical vulnerability in MongoDB to steal sensitive information directly from an affected server's memory. The attacks appear to have started on Dec. 29, barely ...
There are all sorts of running goals—conquer a marathon, get out three times a week—but one of the most significant performance-based goals is to Get Faster! Let’s face it: Most of us, unless we’re ...
Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers. Threat actors started exploiting a high-severity MongoDB ...
A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible instances identified across the world. The vulnerability ...
Update 12/26/25: Article updated to correct that the flaw has not been officially classified as an RCE. MongoDB has warned IT admins to immediately patch a high-severity memory-read vulnerability that ...
MongoDB reported another breakout quarter, with total revenue up 19% and Atlas revenue expanding 30% year over year. On top of the rolling 12-month customer addition approaching 10,000 for the first ...
MongoDB (MDB) could be a solid addition to your portfolio given a notable revision in the company's earnings estimates. While the stock has been gaining lately, the trend might continue since its ...
Thirty years ago today, Netscape Communications and Sun Microsystems issued a joint press release announcing JavaScript, an object scripting language designed for creating interactive web applications ...
MongoDB boosts full-year earnings outlook by more than $1 a share, sending stock up 23%. Analysts raise price targets, citing sustained AI-driven demand and Atlas growth. Q3 results beat expectations ...
A critical vulnerability in the popular expr-eval JavaScript library, with over 800,000 weekly downloads on NPM, can be exploited to execute code remotely through maliciously crafted input. The ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果