Kaseya Patches New 0-Day Vulnerabilities Affecting Unitrends Servers

Kaseya Patches New 0-Day Vulnerabilities Affecting Unitrends Servers

New set of patches issued by the U.S. technology firm

Top Linux Vulnerabilities Exploited by Hackers

Top Linux Vulnerabilities Exploited by Hackers

The newly discovered vulnerabilities were used to by cybercriminals to breach Linux systems millions of times

More Than 600 ICS Flaws Spotted in H1 2021

More Than 600 ICS Flaws Spotted in H1 2021

A study by Claroty, a company specialising in industrial cyber security, reveals disturbing results about ICS products

Vulnerabilities in Realtek SDK Affect Dozens of IoT Vendors

Vulnerabilities in Realtek SDK Affect Dozens of IoT Vendors

Numerous routers, IoT devices, and webcams are vulnerable to several remote code execution vulnerabilities

Adobe Fixes Critical Flaws Affecting Magento Shops

Adobe Fixes Critical Flaws Affecting Magento Shops

Magento receives updates for vulnerabilities that allow hackers to take control of e-commerce sites using the platform

Critical Vulnerabilities Found in macOS Privacy Protections

Critical Vulnerabilities Found in macOS Privacy Protections

Even though the TCC can prevent encryption during a ransomware attack, it still has some flaws that hackers can exploit

Google Patches Critical Android Vulnerabilities

Google Patches Critical Android Vulnerabilities

The August 2021 Android Security Bulletin contains fixes for another wave of security vulnerabilities

Critical Vulnerabilities Found in Custom TCP/IP Stack

Critical Vulnerabilities Found in Custom TCP/IP Stack

New NicheStack Critical Security Flaws Have Been Discovered

PwnedPiper Threatens Thousands of Hospitals Around the World

PwnedPiper Threatens Thousands of Hospitals Around the World

Cybersecurity experts discovered critical security vulnerabilities in widely used hospital tube systems

Top 30 Critical Security Flaws Most Used by Cybercriminals

Top 30 Critical Security Flaws Most Used by Cybercriminals

Hackers continue to attack their victims on a regular basis by exploiting old vulnerabilities in outdated software

Several Security Flaws Found in 3 Open-Source Software

Several Security Flaws Found in 3 Open-Source Software

If flawed open source software solutions are properly exploited, the entire server can be compromised

Coursera API Flaws Revealed by Cybersecurity Experts

Coursera API Flaws Revealed by Cybersecurity Experts

Due to the BOLA vulnerability, personal information of the online learning platform's users' may be exposed

NVIDIA’s Jetson Chipset Comes with Exploitable Bugs

NVIDIA’s Jetson Chipset Comes with Exploitable Bugs

Cybercriminals can exploit flaws in Jetson SoC framework

New UAF Flaw Affecting Microsoft Office to be Patched Today

New UAF Flaw Affecting Microsoft Office to be Patched Today

Malicious Word and Excel documents can compromise your PC

Siemens PLCs New Security Flaws Uncovered

Siemens PLCs New Security Flaws Uncovered

Siemens released updates to fix PCLs serious vulnerabilities

How Safe is Your Router Anyhow?

How Safe is Your Router Anyhow?

All Wireless Routers sold since 1997 affected by recently discovered security flaws dubbed Frag Attacks

Qualcomm's Modem Bug Makes Billions of Android Devices Exploitable

Qualcomm's Modem Bug Makes Billions of Android Devices Exploitable

Researchers found a new flaw in Qualcomm’s Mobile Station Modem chip that makes Android devices vulnerable to hacking

 
Want more? Browse: