News

containers

Security researchers have discovered a โ€œbreakoutโ€ vulnerability that affects major cloud services. Patches are rolling out in a deluge ofโ€ฆ

|
Last updated September 23, 2021
xiaomi_scooter

Attackers can send commands to the Xiaomi M365 e-scooter and risk the lives of its riders. The commands can beโ€ฆ

|
Last updated September 23, 2021
vkontakte

A team of hackers played a prank against the VKontakte IT team after the latter failed to acknowledge a bugโ€ฆ

|
Last updated September 23, 2021
lenovo_watch_x

Lenovo Watch X contains at least six serious vulnerabilities that undermine the privacy and security of the wearer. The smartwatchโ€ฆ

|
Last updated September 23, 2021
winrar_featured

Users of WinRAR opening an ACE archive may end up having extractions of malicious files in various locations. The oldโ€ฆ

|
Last updated September 23, 2021
5g_4g_networks_antenna

Locating users, pushing fake data to them, and extracting their personal information is possible via vulnerabilities found in 4G/5G networks.ย โ€ฆ

|
Last updated September 23, 2021
blog-drupal-module

It took hackers only a couple of days to launch multiple attacks against unprotected Drupal websites. The release of aโ€ฆ

|
Last updated September 23, 2021
chrome_browser

High severity Chrome vulnerability discovered by Google, but attackers reportedly discovered it first. The vulnerability allows for arbitrary code executionโ€ฆ

|
Last updated September 23, 2021
malware_code

A new malware that communicates via Slack, and uses GitHub gist snippets is spotted on the wild. The particular malwareโ€ฆ

|
Last updated September 23, 2021
wifi_wpa3

The WPA3 standard is plagued by five vulnerabilities, four of which are quite severe. The flaws allow for accessing aโ€ฆ

|
Last updated September 23, 2021
Unlocked padlock

Four VPN solutions offered by respected vendors are found to contain severe vulnerabilities. The flaws concern the way these productsโ€ฆ

|
Last updated September 23, 2021
belkin_wemo_insight

Belkinโ€™s Wemo Insight is still plagued by the same zero-day vulnerabilities that were disclosed a year ago. The product isโ€ฆ

|
Last updated September 23, 2021
d-link_cloud_cam

The D-Link DCS-2132L is encrypting none of its sensitive communication information. An attacker could intercept the data stream, gather theโ€ฆ

|
Last updated September 23, 2021

Google offers free replacements for Bluetooth Titan keys that are vulnerable to attacks. A misconfiguration could allow an attacker inโ€ฆ

|
Last updated September 23, 2021
Linksys Modem

A wide range of Linksys Wi-Fi routers is leaking sensitive information that can lead to serious problems. Most of theโ€ฆ

|
Last updated September 23, 2021

Intel CPUs became about 16% slower due to this yearโ€™s mitigations, while AMD CPUs were impacted only by 3%. Thisโ€ฆ

|
Last updated September 23, 2021

27% of organizations suffer data breaches due to irregular patching schedule. 11% of them donโ€™t have the capacity to detectโ€ฆ

|
Last updated September 23, 2021
Windows_10

Microsoft released their June security update, and it fixes 88 vulnerabilities on Windows 10. Out of these, 19 are ofโ€ฆ

|
Last updated September 23, 2021
Yubico Logo

Yubico offers replacement keys for the FIPS product series, due to a 'reduced randomness' vulnerability. The keys are running someโ€ฆ

|
Last updated September 23, 2021
bluetooth_smartphone

Three scientists have developed a Bluetooth tracking algorithm that works on Mac, iOS, and Windows. Android devices are invulnerable toโ€ฆ

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: