Top cyber security news|21 May 19
Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden. Below are the links ofRead More →
Here we talk about cyber attacks to Antivirus Companies, WhatsApp and Samsung, backdoor vs Microsoft Exchange and the identity of Satoshi Nakamoto is still hidden. Below are the links ofRead More →
Recently a new vulnerability was reported in the Windows 10 operating system that, if exploited, would allow attackers to gain high privileges on the compromised computer. Now, experts from theRead More →
A group of specialists from the IICS’s information security course has discovered a critical vulnerability in Cisco equipment that, if exploited, could allow a malicious hacker to install backdoors inRead More →
Microsoft has just announced the launch of a set of update patches to correct a critical vulnerability in Remote Desktop services. If exploited, the flaw could quickly spread over theRead More →
The tech company Intel has confirmed that the problems discovered on their processors chips imply a decrease in the performance of the computers of some users, report experts in informationRead More →
According to web application penetration testing specialists, Google announced the launch of a Chrome OS update that includes a series of fixes for the MDS vulnerabilities that, if exploited, couldRead More →
IT security services specialists reported the emergence of new variants of speculative execution exploiting the architecture of Intel CPUs. Because of this the Apple security team published a document explainingRead More →
According to web application security testing specialists, over 25k Linksys Smart WiFi routers are impacted by a vulnerability that, if exploited, would allow hackers remote access without authentication to extensiveRead More →
Web application security course specialists have reported a critical vulnerability in the Cisco 1001-X series router that, if exploited, would allow threat actors to take control of any compromised device,Read More →
Linux operating system computers running versions prior to 5.0.8 kernel distributions are impacted by a vulnerability exposing systems committed to a wide variety of remote attacks, as reported by informationRead More →