News

apple zero day

Researchers have discovered a blunder in Bonjourโ€™s coding, which introduces a well-documented flaw. A capable group of malicious actors haveโ€ฆ

|
Last updated September 23, 2021
sudo

A researcher discovered a severe flaw in the sudo program, which enables root command execution by anyone. The trick isโ€ฆ

|
Last updated September 23, 2021
Google Chrome

Update your Chrome browser immediately, as a flaw discovered by Kaspersky Labs is under active exploitation. Not many technical detailsโ€ฆ

|
Last updated September 23, 2021
Computer Data Code

The first BlueKeep cyberattack is just about dropping a Monero miner. This is a work of amateurs, but things areโ€ฆ

|
Last updated September 23, 2021
mcafee

Three McAfee security products have been found to be vulnerable to system-takeover attacks. The attack method is similar to whatโ€ฆ

|
Last updated September 23, 2021
Windows Alternatives - Feature Image

The November Windows patch is out, and it comes with a large number of critical fixes. All users are urgedโ€ฆ

|
Last updated September 23, 2021
docker container

Unit42 presents a proof of concept code that works well in unpatched Docker installations. Admins who failed to apply theโ€ฆ

|
Last updated September 23, 2021
Symantec_Headquarters_Mountain_View

Symantecโ€™s Endpoint Security belongs to the big group of security apps that donโ€™t validate DLL files. SafeBreach researchers have developedโ€ฆ

|
Last updated September 23, 2021
android bloatware

Many widely used applications on the Android ecosystem are using vulnerable native libraries. The app maintainers donโ€™t pay much attentionโ€ฆ

|
Last updated September 23, 2021
google pixel camera

Researchers discovered alarming camera app flaws spread across the Android ecosystem. The PoC can activate the camera silently, steal mediaโ€ฆ

|
Last updated September 23, 2021
DLL file

Kaspersky, Autodesk, and Trend Micro in the spotlight again for severe privilege escalation vulnerabilities. Researchers from SafeBreach discovered that someโ€ฆ

|
Last updated September 23, 2021
truecaller

Truecaller could allow an attacker to inject a malicious link as a profile URL, exploiting targets on the platform. Theโ€ฆ

|
Last updated September 23, 2021
WordPress logo

Two popular โ€œUltimate Addonsโ€ plugins allow hackers to take full control of WordPress websites. The only thing that the attackerโ€ฆ

|
Last updated September 23, 2021
citrix

Researcher discovers a highly critical vulnerability that affects widely-used Citrix software products. The vulnerability takes only a minute to exploitโ€ฆ

|
Last updated September 23, 2021
router

A researcher has discovered three flaws that concern Ruckus Networks Unleashed models. The vendor has already fixed the vulnerabilities viaโ€ฆ

|
Last updated September 23, 2021
nvidia experience

NVIDIA fixes a severe vulnerability in the GeForce companion app, which leads to privilege escalation and DoS. The actor wouldโ€ฆ

|
Last updated September 23, 2021
microsoft azure

The Cyberark team has discovered a severe flaw in specific Microsoft OAuth 2.0 applications. An attacker could steal the accessโ€ฆ

|
Last updated September 23, 2021
foxit

Cisco discovered four remote code execution vulnerabilities in Foxit PDF Readerโ€™s JavaScript engine. The developer was immediately notified, and aโ€ฆ

|
Last updated September 23, 2021
nsa

NSA has helped Microsoft fix a highly critical Windows bug instead of keeping it for themselves. The problem concerns aโ€ฆ

|
Last updated September 23, 2021
WhatsApp Quote Feature Security Issue

A flaw in WhatsApp client for macOS and Windows could have resulted in RCE attack scenarios. The exploit was madeโ€ฆ

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: