Users of the PDF reader Foxit must upgrade their software to Reader 9.3 and Foxit PhantomPDF 9.3 to correct over 100 flaws...
It’s more secure to use unique passwords for each service and password managers for each app we use Single logins are a...
A bug in the Google search engine breaks the links shown in the search results if the link contains a plus symbol...
Mozilla Firefox Released security updates that cover 2 critical vulnerabilities in Firefox 62.0.3 and Firefox ESR 60.2.2. One of the remote code execution...
Lenovo has launched an alert for nine “high-risk” rated vulnerabilities that impact 20 network attached storage devices (NAS) sold by the company,...
A security investigator discovered the flaw Dhiraj Mishra, researcher on cybersecurity and ethical hacking discovered a default configuration in Telegram that could expose the IP address of...
An error has been discovered in all modern WiFi routers that cannot be solved Specialists in ethical hacking and cybersecurity at the...
The company’s product list with this flaw keeps growing Cisco has confirmed that many of its products that depend on the Linux...
The company has patched a critical vulnerability in Cisco Video Surveillance Manager that could be exploited to gain root access Reports of...
The flaw allows malicious actors to avoid privacy measures An expert in cybersecurity and ethical hacking was able to demonstrate that Apple’s...
A Microsoft Zero-day vulnerability that existing in Microsoft JET Database Engine has been crossed zero-day Initiative (ZDI) 120 days disclosure deadline and...
Western Digital My Cloud authentication bypass vulnerability would allow hackers to access stored content Researchers from an ethical hacking firm discovered a...
Firmware used in up to 800k cameras is vulnerable to attacks thanks to a buffer overflow vulnerability Between 180k and 800k CCTV...
This tool connects PCs within organizations to industrial control systems Experts in ethical hacking discovered various vulnerabilities in Fuji Electric V-Server, a...
A Monero mining script is spreading using remote command execution vulnerability It seemed a matter of time before attacks like these happened...
A recently disclosed flaw in some of Schneider Electric’s Programmable Logic Controllers (PLC) would allow malicious actors to cause a significant disruption...
Cybersecurity reports reveal the most frequently exploited vulnerabilities Shortly after the launch of its second annual report called “Under the Hoodie: Lessons...
The flaws could allow code execution Ethical hacking specialists have recently published a vulnerability report jointly with the enterprise systems monitoring software provider Opsview. The...
The company is already working on a security update A recently discovered vulnerability in the Cisco Data Center Network Manager software could allow a...
Apparently user’s information has not been compromised A vulnerability has been patched in a Facebook server that could have enabled information disclosure and command...
A cyber security researcher helped to report the flaw The maintainers of Packagist, the largest package repository in the PHP ecosystem, have...