Zoom App Vulnerability Let Attackers Execute Remote Code
Zoom recently disclosed multiple vulnerabilities affecting its suite of applications, including a critical flaw that could allow attackers to execute...
Read more →Zoom recently disclosed multiple vulnerabilities affecting its suite of applications, including a critical flaw that could allow attackers to execute...
Read more →A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community websites to deliver Cobalt Strike malware,...
Read more →Rakuten Viber has launched new solutions to further protect communication on the platform. Businesses can now quickly authenticate users to...
Read more →Nov 13, 2024Ravie LakshmananCloud Security / Vulnerability A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that...
Read more →Server manufacturers have long recognised the niche in public cloud computing that physical servers neatly fill. This has evolved over...
Read more →Google has released Chrome 131 to the stable channel for Windows, Mac, and Linux, addressing 12 security vulnerabilities, including several...
Read more →The Chrome team has officially announced the release of Chrome 131 for Windows, Mac, and Linux. The new version, Chrome...
Read more →Syteca launched Account Discovery, a new feature within its Privileged Access Management (PAM) solution. This enhancement enables organizations to automatically...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding two newly disclosed vulnerabilities in Microsoft Windows, urging...
Read more →Ivanti, the well-known provider of IT asset and service management solutions, has issued critical security updates for its products Ivanti Connect...
Read more →Emmenhtal Loader uses LOLBAS techniques, deploying malware like Lumma and Amadey through legitimate Windows tools. Its infection chain of LNK...
Read more →The Apache CloudStack project has announced the release of critical security updates to address severe vulnerabilities in its KVM-based infrastructure....
Read more →