Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data
Mobile VPN apps promise to protect privacy and secure communications on smartphones, but a comprehensive analysis of nearly 800 free...
Read more →Mobile VPN apps promise to protect privacy and secure communications on smartphones, but a comprehensive analysis of nearly 800 free...
Read more →HackerOne, a leading platform in offensive security, announced it has paid out a total of $81 million in bug bounties...
Read more →Oracle Corporation has officially acknowledged that cybercriminals are targeting customers of its E-Business Suite (EBS) platform through sophisticated extortion campaigns. ...
Read more →Red Hat, the world’s leading enterprise open-source software provider, has officially confirmed a significant security incident involving unauthorized access to...
Read more →Microsoft Defender for Endpoint is currently experiencing a bug that generates false positive alerts concerning out-of-date Basic Input/Output System (BIOS)...
Read more →Microsoft is updating its security policies to require administrator consent for new third-party applications seeking access to Exchange and Teams...
Read more →A proof-of-concept (PoC) exploit has been released for a critical vulnerability chain in VMware Workstation that allows an attacker to...
Read more →A new proof-of-concept (PoC) tool named Obex has been released, offering a method to prevent Endpoint Detection and Response (EDR)...
Read more →An extortion group known as the Crimson Collective claims to have breached Red Hat’s private GitHub repositories, making off with...
Read more →Google has released Chrome 141 to address 21 security vulnerabilities, including critical flaws that could allow attackers to crash browsers...
Read more →Microsoft has confirmed it is investigating a significant bug in the classic Outlook for Windows desktop client that causes the...
Read more →Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers...
Read more →