February has actually been a huge month for protection updates, with the similarity Apple, Microsoft, and also Google launching spots… Read More
As many as 23 new high severity security vulnerabilities have been disclosed in different implementations of Unified Extensible Firmware Interface… Read More
The digital security team at the U.K. National Health Service (NHS) has raised the alarm on active exploitation of Log4Shell… Read More
The Department of Homeland Security (DHS) has announced that the 'Hack DHS' program is now also open to bug bounty… Read More
The Apache Software Foundation has released an update to address a critical flaw in its hugely popular web server that… Read More
Multiple security flaws affected USB over Ethernet, which, in turn, affected numerous cloud services. These… Numerous Flaws In USB Over… Read More
Cyber authorities have called for administrators to immediately patch a quartet of vulnerabilities after attributing some attacks that used them… Read More
Security researchers have revealed new vulnerabilities in a popular Android chip that could have allowed threat actors to snoop on… Read More
Hide My WP, a popular WordPress security plugin, contained a serious SQL injection (SQLi) vulnerability and a security flaw that… Read More
With a CVSS rating of 7.5, the most severe is the arbitrary file read bug (CVE-2021-21980), abuse of which could… Read More
Attackers are targeting unpatched Exchange servers for vulnerabilities such as ProxyLogon and ProxyShell to breach corporate email servers and drop… Read More
A recent analysis made by researchers from Digital Shadows indicates that an increasing amount of chatter has been observed on… Read More
The Mаgniber rаnsomwаre group has updated its attack method and has been exploiting two Internet Explorer (IE) vulnerаbilities. Moreover, the… Read More
As many as 13 security vulnerabilities have been discovered in the Nucleus TCP/IP stack, a software library now maintained by… Read More
Palo Alto Networks discovered that Emissary Panda, a hacking group with ties to China, is exploiting Zoho software flaws in… Read More
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a catalog of vulnerabilities, including from Apple, Cisco, Microsoft, and Google, that have known… Read More