Application Security

Chrome 0-day vulnerability – 8th Vulnerability this year

Google developers have released an updated version of the Chrome browser for Windows, Mac and Linux ( 91.0.4472.164 ), which eliminated a zero-day vulnerability in the...

CVE-2021-3452 – Lenovo patches a vulnerability affecting dozens of ThinkPad models

Lenovo has released information on three BIOS vulnerabilities in two desktop models and approximately 60 different notebook computers. The first issue, identified as CVE-2021-3452, threatens dozens of...

Google urged Chromium developers to ditch Windows 7

Eleven months after Microsoft officially ended technical support for the Windows 7 operating system, Google finally called on the Chromium developers to stop using the OS. “I...

Critical WordPress bug in Contact Form 7 plugin – More Than 5,000,000 installations

The developers of the popular Contact Form 7 WordPress plugin, which is installed on more than 5,000,000 sites, have released a fix for a...

Trend Micro Vulnerabilities in IWSVA Web Gateway has been Fixed!

The company Trend Micro this week sent out to customers update InterScan Web Security Virtual Appliance (IWSVA) , which patches several serious vulnerabilities. A...

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms:...

Firefox 84 Bug; fixed a critical bug that is relevant for Google Chrome

Mozilla has released a new version of its browser - Firefox 84, in which the developers have eliminated a number of dangerous vulnerabilities (even...

Vulnerability in WordPress plugin exploited to reset admin passwords

Last week, the popular Easy WP SMTP  plugin  for WordPress, installed on more than 500,000 sites, was patched with a serious administrator password reset vulnerability. This plugin allows...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

TrickBot developers is linked with Diavol ransomware

Fortinet specialists published a report in which they report that the...