Zero-day vulnerability in Windows 10
Ben Hawkes, leader of Google‘s security team, released a report detailing the finding of a zero-day vulnerability in the Windows operating system that has already been actively exploited. The expectedRead More →
Ben Hawkes, leader of Google‘s security team, released a report detailing the finding of a zero-day vulnerability in the Windows operating system that has already been actively exploited. The expectedRead More →
Cybersecurity specialists report the finding of multiple vulnerabilities in Samba, a free software re-implementation of the SMB networking protocol. According to the report, successful exploitation of these flaws would allowRead More →
A group of specialists managed to extract the secret key to encrypting updates on a wide variety of Intel CPUs, a finding that could have significant impact on the industry.Read More →
Cybersecurity specialists reported the detection of an improper authentication vulnerability in HPE StoreServ Management Console, from HP tech company. It appears that exploiting this flaw would allow threat actors toRead More →
Oracle recently released its Critical Patch Update for October 2020, in which it first lists all updates to address failures in third-party components that cannot be exploited in the contextRead More →
Waze has become one of the most widely used platforms by drivers around the world, although it is a widely known fact that developers need to improve multiple aspects ofRead More →
A report from the National Cybersecurity Center (NCSC) in the UK revealed the finding of a remote code execution (RCE) vulnerability in Microsoft SharePoint. Tracked as CVE-2020-16952, this flaw wouldRead More →
Cybersecurity specialists report finding three vulnerabilities in Junos OS, the operating system used in the network products of the technology company Juniper Networks. According to the report, flaws could triggerRead More →
Google security teams have released a report detailing a severe vulnerability present in the Bluetooth stack in Linux kernel versions earlier than 5.9 that support BlueZ. Linux 5.9 has beenRead More →
Cybersecurity specialists have revealed the finding of multiple privilege escalation vulnerabilities in Acronis True Image, Cyber Backup, and Cyber Protection solutions that would allow unprivileged threat actors to execute arbitraryRead More →