News

kaspersky office

Multiple Kaspersky products followed a URL checking practice that enabled individual user tracking online. The issue has been fixed through…

|
Last updated September 23, 2021
Mozilla Firefox

Earlier Firefox versions allowed user passwords to be copied even if a master password was set. An unauthenticated person with…

|
Last updated September 23, 2021
bitdefender

SafeBreach discovers yet another privilege escalation vulnerability on a security product. The flaw has similar grounds and method of exploitation…

|
Last updated September 23, 2021
nest camera

Talos researchers discovered eight flaws that plague Nest IQ Indoor and the weaver binary. The attacks are not entirely easy…

|
Last updated September 23, 2021
vulnerability

Metasploit publishes a new BlueKeep exploit module that is working better than anything else we’ve had before. The team of…

|
Last updated September 23, 2021
WordPress logo

Attackers probe WordPress sites for the Rich Reviews plugin and infect them with malvertising code. The plugin carries a zero-day…

|
Last updated September 23, 2021
iphones

A researcher discovered a BootROM exploit that works on almost all iOS devices out there. The exploit requires physical access…

|
Last updated September 23, 2021
signal

Signal vulnerable to an auto-answer exploit, which requires a modified client for the caller. The attacker may activate the microphone…

|
Last updated September 23, 2021
Drupal logo

Unpatched Drupal systems are being targeted by powerful malware based on a year-old flaw. The actors have several specialized PoC…

|
Last updated September 23, 2021
D-Link

D-Link acknowledged the recent flaw in their home Wi-Fi routers, but they’re not planning to fix it. Those who have…

|
Last updated September 23, 2021
hp_quarters

HP’s hardware performance monitoring tool is vulnerable to severe remote execution attacks. The tool runs on high system privileges but…

|
Last updated September 23, 2021
apple zero day

Researchers have discovered a blunder in Bonjour’s coding, which introduces a well-documented flaw. A capable group of malicious actors have…

|
Last updated September 23, 2021
sudo

A researcher discovered a severe flaw in the sudo program, which enables root command execution by anyone. The trick is…

|
Last updated September 23, 2021
Google Chrome

Update your Chrome browser immediately, as a flaw discovered by Kaspersky Labs is under active exploitation. Not many technical details…

|
Last updated September 23, 2021
Computer Data Code

The first BlueKeep cyberattack is just about dropping a Monero miner. This is a work of amateurs, but things are…

|
Last updated September 23, 2021
mcafee

Three McAfee security products have been found to be vulnerable to system-takeover attacks. The attack method is similar to what…

|
Last updated September 23, 2021
Windows Alternatives - Feature Image

The November Windows patch is out, and it comes with a large number of critical fixes. All users are urged…

|
Last updated September 23, 2021
docker container

Unit42 presents a proof of concept code that works well in unpatched Docker installations. Admins who failed to apply the…

|
Last updated September 23, 2021
Symantec_Headquarters_Mountain_View

Symantec’s Endpoint Security belongs to the big group of security apps that don’t validate DLL files. SafeBreach researchers have developed…

|
Last updated September 23, 2021
android bloatware

Many widely used applications on the Android ecosystem are using vulnerable native libraries. The app maintainers don’t pay much attention…

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: