Application Security

Google urged Chromium developers to ditch Windows 7

Eleven months after Microsoft officially ended technical support for the Windows 7 operating system, Google finally called on the Chromium developers to stop using the OS. “I...

Critical WordPress bug in Contact Form 7 plugin – More Than 5,000,000 installations

The developers of the popular Contact Form 7 WordPress plugin, which is installed on more than 5,000,000 sites, have released a fix for a...

Trend Micro Vulnerabilities in IWSVA Web Gateway has been Fixed!

The company Trend Micro this week sent out to customers update InterScan Web Security Virtual Appliance (IWSVA) , which patches several serious vulnerabilities. A...

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party extensions for Google Chrome and Microsoft Edge. All of these extensions were associated with popular platforms:...

Firefox 84 Bug; fixed a critical bug that is relevant for Google Chrome

Mozilla has released a new version of its browser - Firefox 84, in which the developers have eliminated a number of dangerous vulnerabilities (even...

Vulnerability in WordPress plugin exploited to reset admin passwords

Last week, the popular Easy WP SMTP  plugin  for WordPress, installed on more than 500,000 sites, was patched with a serious administrator password reset vulnerability. This plugin allows...

Worm-like RCE vulnerability found in Microsoft Teams

Oskars Vegeris, a security researcher at Evolution Gaming, discovered a remote code execution vulnerability in the Microsoft Teams enterprise platform that requires no user...

Experts have discovered another malware for attacks on Docker

Since 2017, criminals have increasingly attacked Docker and Kubernetes systems, which were already widespread by that time. Most of these attacks are extremely simple: cybercriminals...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

Pareto botnet claims jailbroken devices are TVs

Experts from Human Security (formerly White Ops) have discovered the Pareto botnet that infects Android devices and uses them to scam...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Five months before the SolarWinds backdoor was sent out, hackers carried out a test attack

Cybercriminals who hacked Texas-based software maker SolarWinds conducted a...

90% of site hacking ads are looking for a hacker performer

Positive Technologies experts analyzed ten of the most active forums on...

OpenWRT Forum Suffered by Hack and Data Leakage

The open source project OpenWRT, known for its firmware...