Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments. The tech...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in software from...
With the use of the Splunk software, real-time data can be collected, indexed, and corroborated in a searchable repository from which graphs,...
Multiple vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software that could be chained together by an unauthenticated, remote attacker to...
The OpenSSL project has rolled out fixes to contain two high-severity flaws in its widely used cryptography library that could result in...
Linus Torvalds, the creator of Linux and Git, has his own law in software development, and it goes like this: “given enough...
The serious XML External Entity (XXE) and remote code execution (RCE) vulnerabilities in Cloud Foundation have been patched, according to VMware. CVE-2021-39144...
Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect Secure Mobility Client for...
For virtual environments built on VMware vSphere, Nutanix AHV, and Microsoft Hyper-V hypervisors, Veeam Backup & Replication is a proprietary backup application....
Out-of-bounds read causing DoS Attack – CVE-ID: CVE-2022-41741, CVE-2022-41742 A remote attacker might exploit this nginx vulnerability to access potentially sensitive data or launch...
This week, WordPress 6.0.3 began to be distributed. The most recent security update fixes 16 flaws. In addition to addressing open redirect,...
The Linux kernel WiFi stack has five serious flaws, according to research, which a hacker might use to execute arbitrary code or...
The leader in virtualization and cloud computing technologies, VMware, has released a security fix for two vulnerabilities in its vCenter Server software...
A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or...
Microsoft has acknowledged that it is aware of two zero-day vulnerabilities in Exchange Server that have been used in deliberate attacks. The...
Two security flaws in WhatsApp’s chat app for iOS and Android that might have been used to remotely execute malware on the device...
Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the...
In order to deliver cryptocurrency mining malware, the threat actors are actively exploiting both old and newly discovered vulnerabilities in Oracle WebLogic...
Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion,...
Four BIOS-related vulnerabilities have recently been discovered, according to a new security alert from Lenovo. Threat actors can use these flaws to...
A variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service bots by taking...