Important IT Management Metrics in the Remote Workplace
To ensure the security of web applications, companies need to monitor their usage. This includes, but is not limited to, the number of users who access the application and itsRead More →
To ensure the security of web applications, companies need to monitor their usage. This includes, but is not limited to, the number of users who access the application and itsRead More →
Intel security teams announced the detection of two critical vulnerabilities in a wide variety of products and whose exploitation would allow threat actors to perform privilege escalation attacks on affectedRead More →
Zoom Video Communications security teams announced the patching of several vulnerabilities in their local solutions for video conferencing and other products, including Zoom Meeting Connector Controller, Zoom Virtual Room ConnectorRead More →
Researchers at Google Threat Analysis Group (TAG) have revealed a report detailing how a group of threat actors managed to spy on visitors to certain websites in Hong Kong usingRead More →
VMware developers released the detection of a privilege escalation vulnerability in vCenter Server. Tracked as CVE-2021-22048, the flaw received a score of 7.1/10 according to the Common Vulnerability Scoring SystemRead More →
Information security specialists reported the detection of 8 security vulnerabilities in Samba, the well-known free software re-implementation of the SMB networking protocol initially developed by Andrew Tridgell. According to theRead More →
Experts recently discovered a set of critical vulnerabilities that could allow threat actors to compromise millions of Internet connected devices, including deployments used in hospitals and other critical services. DubbedRead More →
Cybersecurity specialists report the detection of two critical vulnerabilities in Philips Tasy EMR, a medical record and health services management tool. Tracked as CVE-2021-39375 and CVE-2021-39376, both flaws received scoresRead More →
Cybersecurity specialists report the patching of a critical vulnerability in the Transparent Inter Process Communication (TIPC) module, implemented in the Linux kernel to facilitate communication within the cluster through EthernetRead More →
It has been just a few hours since the start of the Pwn2Own Austin 2021 hacking event and there have already been reports of severe vulnerabilities in commonly used devices,Read More →