News

winrar_featured

Users of WinRAR opening an ACE archive may end up having extractions of malicious files in various locations. The old…

|
Last updated September 23, 2021
5g_4g_networks_antenna

Locating users, pushing fake data to them, and extracting their personal information is possible via vulnerabilities found in 4G/5G networks. …

|
Last updated September 23, 2021
blog-drupal-module

It took hackers only a couple of days to launch multiple attacks against unprotected Drupal websites. The release of a…

|
Last updated September 23, 2021
chrome_browser

High severity Chrome vulnerability discovered by Google, but attackers reportedly discovered it first. The vulnerability allows for arbitrary code execution…

|
Last updated September 23, 2021
malware_code

A new malware that communicates via Slack, and uses GitHub gist snippets is spotted on the wild. The particular malware…

|
Last updated September 23, 2021
wifi_wpa3

The WPA3 standard is plagued by five vulnerabilities, four of which are quite severe. The flaws allow for accessing a…

|
Last updated September 23, 2021
Unlocked padlock

Four VPN solutions offered by respected vendors are found to contain severe vulnerabilities. The flaws concern the way these products…

|
Last updated September 23, 2021
belkin_wemo_insight

Belkin’s Wemo Insight is still plagued by the same zero-day vulnerabilities that were disclosed a year ago. The product is…

|
Last updated September 23, 2021
d-link_cloud_cam

The D-Link DCS-2132L is encrypting none of its sensitive communication information. An attacker could intercept the data stream, gather the…

|
Last updated September 23, 2021

Google offers free replacements for Bluetooth Titan keys that are vulnerable to attacks. A misconfiguration could allow an attacker in…

|
Last updated September 23, 2021
Linksys Modem

A wide range of Linksys Wi-Fi routers is leaking sensitive information that can lead to serious problems. Most of the…

|
Last updated September 23, 2021

Intel CPUs became about 16% slower due to this year’s mitigations, while AMD CPUs were impacted only by 3%. This…

|
Last updated September 23, 2021

27% of organizations suffer data breaches due to irregular patching schedule. 11% of them don’t have the capacity to detect…

|
Last updated September 23, 2021
Windows_10

Microsoft released their June security update, and it fixes 88 vulnerabilities on Windows 10. Out of these, 19 are of…

|
Last updated September 23, 2021
Yubico Logo

Yubico offers replacement keys for the FIPS product series, due to a 'reduced randomness' vulnerability. The keys are running some…

|
Last updated September 23, 2021
bluetooth_smartphone

Three scientists have developed a Bluetooth tracking algorithm that works on Mac, iOS, and Windows. Android devices are invulnerable to…

|
Last updated September 23, 2021

Your iPhone is continuously sending out Bluetooth LE data packets that can be misused by malicious actors. The latest Bluetooth…

|
Last updated September 23, 2021
VPN

An urgent warning to update your FortiGate and Pulse Secure VPN products is doing a final circulation. Actors are now…

|
Last updated September 23, 2021
android pin

"Over the air" configuration messages can trick recipients into accepting phishing network settings. The vulnerable device vendors are Samsung, Huawei,…

|
Last updated September 23, 2021
gps tracking

Avast researchers find multiple vulnerabilities that scourge China-made GPS trackers. The researchers were able to send commands to remote devices…

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: