18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices
Aug 08, 2024Ravie LakshmananVulnerability / Browser Security Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers...
Read more →Aug 08, 2024Ravie LakshmananVulnerability / Browser Security Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers...
Read more →Aug 08, 2024Ravie LakshmananNetwork Security / Cloud Security Cybersecurity researchers have discovered a novel phishing campaign that leverages Google Drawings...
Read more →Aug 08, 2024The Hacker NewsCyber Threat Management The last few years have seen more than a few new categories of...
Read more →Aug 08, 2024Ravie LakshmananWindows Security / Vulnerability Microsoft said it is developing security updates to address two loopholes that it...
Read more →Aug 08, 2024The Hacker NewsArtificial Intelligence / Network Security The Immersive Experience Happening This September in Las Vegas! In an...
Read more →Aug 08, 2024Ravie LakshmananVulnerability / Network Security A critical security flaw impacting Progress Software WhatsUp Gold is seeing active exploitation...
Read more →Aug 08, 2024Ravie LakshmananCritical Infrastructure / Malware The ransomware strain known as BlackSuit has demanded as much as $500 million...
Read more →Aug 07, 2024Ravie LakshmananEmail Security / Vulnerability Cybersecurity researchers have disclosed details of security flaws in the Roundcube webmail software...
Read more →Aug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dubbed SLUBStick...
Read more →Aug 07, 2024Ravie LakshmananCybersecurity / Incident Response Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor...
Read more →Aug 07, 2024Ravie LakshmananCloud Security / Cyber Espionage An unnamed media organization in South Asia was targeted in November 20233...
Read more →Aug 07, 2024Ravie LakshmananAndroid / Mobile Security, Cybersecurity researchers have lifted the lid on a new technique adopted by threat...
Read more →