Graphics processor developers offer protection against vulnerabilities found on Windows and Linux systems Nvidia, a company specializing in the development of graphic...
We usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around;...
These malicious files allow victims’ data collection Network security and ethical hacking specialists from the International Institute of Cyber Security report the...
This vulnerability can be exploited only by local attackers Malicious hackers could exploit a privilege escalation vulnerability in Cisco Webex Meetings for...
Google experts consider these vulnerabilities to be inherent in modern processors design According to network security and ethical hacking specialists from the...
Some versions of the content management system present a critical vulnerability that leaves them exposed to remote code execution attacks Network security...
cybersecurity #infosec #IIS #MicrosoftSystem administrators are recommended to update as soon as possible According to network security and ethical hacking specialists from...
After discovering that the first correction could be bypassed, the company should launch a second Adobe Reader update patch According to network...
About 100 students were affected by the incident Network security and ethical hacking specialists from the International Institute of Cyber Security report...
Medical files, containing personal data of patients of University of Washington Medicine, were mistakenly exposed following a data error. UW Medicine, in...
GitHub renews its vulnerability report rewards program Network security and ethical hacking specialists from the International Institute of Cyber Security report that...
Over 500 million WinRAR users could have been exposed; update your software as soon as possible A critical vulnerability in WinRAR, the...
A fatal cross-site request forgery (CSRF) vulnerability on Facebook was discovered by a security researcher, and interestingly it allowed hackers to take...
Vulnerability would have allowed an attacker to take control of an account by simply clicking a link Facebook has just granted a...
Various Linux distributions might be affected by this security issue Critical privilege-escalation vulnerability could grant total control of the system compromised to...
To exploit the vulnerability, attackers need physical access to the computer, as well as installing a malicious application Network security and ethical...
The company discovered a severe security flaw during a routine process Cisco has notified its customers that it is necessary to install...
Vulnerability has a score of 7.2/10 on the CVSS scale Linux system users are dealing with a new threat. According to network...
An article on ZedNet reads how a security researcher published proof-of-concept (PoC) code for a vulnerability impacting Ubuntu and other Linux distros....
A major security flaw under CVE-2019-05736 that has affected runC is now patched, thanks to the hard work of its developers. The...
The flaw allows sending unauthenticated commands via Bluetooth to the scooter Although the use of smart devices has simplified many daily tasks,...