News

containers

Security researchers have discovered a “breakout” vulnerability that affects major cloud services. Patches are rolling out in a deluge of…

|
Last updated September 23, 2021
xiaomi_scooter

Attackers can send commands to the Xiaomi M365 e-scooter and risk the lives of its riders. The commands can be…

|
Last updated September 23, 2021
vkontakte

A team of hackers played a prank against the VKontakte IT team after the latter failed to acknowledge a bug…

|
Last updated September 23, 2021
lenovo_watch_x

Lenovo Watch X contains at least six serious vulnerabilities that undermine the privacy and security of the wearer. The smartwatch…

|
Last updated September 23, 2021
winrar_featured

Users of WinRAR opening an ACE archive may end up having extractions of malicious files in various locations. The old…

|
Last updated September 23, 2021
5g_4g_networks_antenna

Locating users, pushing fake data to them, and extracting their personal information is possible via vulnerabilities found in 4G/5G networks. …

|
Last updated September 23, 2021
blog-drupal-module

It took hackers only a couple of days to launch multiple attacks against unprotected Drupal websites. The release of a…

|
Last updated September 23, 2021
chrome_browser

High severity Chrome vulnerability discovered by Google, but attackers reportedly discovered it first. The vulnerability allows for arbitrary code execution…

|
Last updated September 23, 2021
malware_code

A new malware that communicates via Slack, and uses GitHub gist snippets is spotted on the wild. The particular malware…

|
Last updated September 23, 2021
Unlocked padlock

Four VPN solutions offered by respected vendors are found to contain severe vulnerabilities. The flaws concern the way these products…

|
Last updated September 23, 2021
wifi_wpa3

The WPA3 standard is plagued by five vulnerabilities, four of which are quite severe. The flaws allow for accessing a…

|
Last updated September 23, 2021
belkin_wemo_insight

Belkin’s Wemo Insight is still plagued by the same zero-day vulnerabilities that were disclosed a year ago. The product is…

|
Last updated September 23, 2021
d-link_cloud_cam

The D-Link DCS-2132L is encrypting none of its sensitive communication information. An attacker could intercept the data stream, gather the…

|
Last updated September 23, 2021

Google offers free replacements for Bluetooth Titan keys that are vulnerable to attacks. A misconfiguration could allow an attacker in…

|
Last updated September 23, 2021
Linksys Modem

A wide range of Linksys Wi-Fi routers is leaking sensitive information that can lead to serious problems. Most of the…

|
Last updated September 23, 2021

Intel CPUs became about 16% slower due to this year’s mitigations, while AMD CPUs were impacted only by 3%. This…

|
Last updated September 23, 2021

27% of organizations suffer data breaches due to irregular patching schedule. 11% of them don’t have the capacity to detect…

|
Last updated September 23, 2021
Windows_10

Microsoft released their June security update, and it fixes 88 vulnerabilities on Windows 10. Out of these, 19 are of…

|
Last updated September 23, 2021
Yubico Logo

Yubico offers replacement keys for the FIPS product series, due to a 'reduced randomness' vulnerability. The keys are running some…

|
Last updated September 23, 2021
bluetooth_smartphone

Three scientists have developed a Bluetooth tracking algorithm that works on Mac, iOS, and Windows. Android devices are invulnerable to…

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: