Articles
Synology and QNAP warn about bugs in their products
Companies have reported numerous critical Netatalk server vulnerabilities.
Based on a published report , multiple flaws allow remote attackers to obtain sensitive information and possibly execute arbitrary...
Articles
Fresh bug in VMware vCenter is already under attack
An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers had already adopted the exploit.
The...
Articles
Attackers scan the network looking for Microsoft Exchange servers vulnerable to ProxyShell
Recently at the Black Hat conference, they talked about the remote code execution vulnerabilities in Microsoft Exchange, collectively known as ProxyShell. Now experts are warning...
Application Security
Chrome 0-day vulnerability – 8th Vulnerability this year
Google developers have released an updated version of the Chrome browser for Windows, Mac and Linux ( 91.0.4472.164 ), which eliminated a zero-day vulnerability in the...
Articles
Unofficial patch for PrintNightmare vulnerability
Last week, we reported that a PoC exploit appeared on the network for the dangerous vulnerability CVE-2021-34527 in Windows Print Spooler (spoolsv.exe), which the researchers named...
Articles
PrintNightmare vulnerability : Microsoft warns of attempts to exploit
Microsoft has not announced when the patch for the vulnerability will be released.
Microsoft has officially confirmed that the acclaimed remote code execution vulnerability known as PrintNightmare...
Articles
Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet
Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.
Articles
Google Docs Vulnerability allowed to view other people’s documents
Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...
Latest news
50% reduction in Google account hacks after enabling 2SV
One of the main problems is the lack of understanding by users of the benefits of additional authorization procedures.
It...
Dangerous vulnerability has been discovered in the latest version of the OpenSSL library
The vulnerability was discovered in the latest version of OpenSSL 3.0.4 , which was released on June 21, 2022 and affects...
Chrome 103 fixes 14 vulnerabilities
This week, Google developers released a stable version of Chrome 103 , which fixed 14 vulnerabilities. Independent researchers who uncovered some of...
Must read
28 dangerous extensions detected for Google Chrome and Microsoft Edge
Avast experts have discovered malware hidden in at least 28 third-party...
Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat
Eleven vulnerabilities, combined under the name Urgent / 11,...
You might also likeRELATEDRecommended to you
Phosphorus-based transistors will provide protection against hacking at the hardware level
A team of researchers from Purdue University has...
Former Cisco engineer received 2 years in prison for destroying Cisco Webex Teams infrastructure
The former Cisco engineer was sentenced to 24 months in prison...
Authentication Bypass Vulnerability Discovered in Bouncy Castle Crypto Library
A dangerous vulnerability (CVE-2020-28052) bypass authentication has been found...