Canon Printers Wi-Fi connection settings Flaw
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing...
Read more →Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing...
Read more →Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,...
Read more →QNAP operating systems are robust, user-friendly software platforms that power NAS and NVR devices. QNAP offers four operating systems, and...
Read more →IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of...
Read more →Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to...
Read more →Trust Wallet made a significant announcement on November 14th, 2022, unveiling its newly launched browser extension for wide usage. The...
Read more →An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security...
Read more →This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of...
Read more →Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information....
Read more →Recent reports indicate that Metabase has been discovered with an unauthenticated Remote Code Execution (RCE) vulnerability that lets threat actors...
Read more →Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature...
Read more →AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands...
Read more →