Flaws allows malicious users to modify content Enterprise network security specialists report that the popular instant messaging app WhatsApp has been affected by multiple...
The OpenEMR system is used around the world Enterprise network security specialists from the International Institute of Cyber Security stated that health...
The company has launched patches for two serious bugs that affect over 160 models of multifunctional printers A few days after publishing...
In a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at...
Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the victim’s windows computers. FELIXROOT backdoor campaign initially...
The Apache Software Foundation (ASF) has released security updates to address multiple vulnerabilities on its Apache Tomcat application server, one of which allows...
Cybersecurity researchers have detected a couple of vulnerabilities in an IoT vacuum cleaner lineup that could let hackers spy on the victims,...
GandCrab ransomware, which has created a hullabaloo in the cybersecurity industry by constantly evolving, has yet again caused a commotion. The latest...
PowerShell script to quickly find missing Microsoft patches for native privilege escalation vulnerabilities. Currently looks for: MS10-Zero15 : User Mode to Ring...
Siemens warns of the presence of six vulnerabilities in some of its SICLOCK central clocks, which synchronize the time in industrial environments,...
A survey was conducted by Outpost24 to identify the managing of cyber-security exposure. This survey was conducted at Infosecurity and around 250...
So what is this Lynis tool all about? Lynis is a security tool used for auditing Unix based systems it’s main aims...
A group of pentest researchers has demonstrated ability to passively identify session details and perform hijacking, allowing phishing attacks. According to the International Institute...
Cisco, a company dedicated to manufacturing telecommunications devices, launched patches for 34 failures in its software, including solutions for five critical vulnerabilities...
Cisco released patches for 34 vulnerabilities affecting multiple products that include 5 critical vulnerabilities, 20 High severity vulnerabilities and 9 medium level...
An information security expert explains that, Archery is an open source vulnerability management and evaluation tool that helps developers and evaluators perform scans and...
Multiple Vulnerabilities found in IBM QRadar chained together allows a remote attacker to bypass authentication and to execute arbitrary commands with root...
After an investigation, security professionals have found a backdoor account in the firmware of the D-Link DIR-620 routers; this allows malicious actors...
A research team from the Tencent firm discovered several security vulnerabilities in BMW models. Tencent Keen Security Lab’s information security experts found 14 vulnerabilities...
A recent investigation revealed six vulnerabilities in Dell EMC RecoverPoint devices. One of the flaws found allows attackers to execute remote unauthenticated...
In an unusual case someone managed to develop a malware attack that, with one click, exploits separate zero-day vulnerabilities in two different...