Security researchers have spotted the first mass-hacking campaign using the BlueKeep exploit; however, the exploit is not being used as a self-spreading worm, as Microsoft…View More BlueKeep attacks are happening, but it’s not a worm
Chances are pretty good you’ve heard the term zero-day vulnerability. The term conjures up images of post-apocalyptic landscapes, where technology has either hit a singularity-level…View More What is a zero-day vulnerability?
Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE. A recently discovered…View More Docker Vulnerability Opens Servers to Container Code
In the spirit of October being the 16th Annual National Cybersecurity Awareness Month, a recent Bitdefender study outlined the cybersecurity conditions of infosecurity companies across…View More Nearly 60% of businesses suffered a data breach in the past 3 years
The Checkm8 exploit, described by the security researcher who published it as “a permanent unpatchable bootrom exploit” might be good news for the jailbreaking community…View More What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?
LastPass has patched a bug that could potentially allow malicious websites to access a web user’s credentials from a previously visited site. Tavis Ormandy, a…View More LastPass Fixes Bug That Leaks Credentials
Software buried in Windows since the days of WinXP can be abused to take complete control of a PC with the help of good ol’…View More Microsoft Patches 18 Year Old Windows Zero Day
Microsoft has identified and patched several vulnerabilities in the Windows Remote Desktop Services (RDS) component — formerly known as Terminal Services — which is widely…View More More critical Remote Desktop flaws expose Windows systems to hacking
Vulnerabilities happen. There’s nothing new or mysterious about that. Neither is there mystery around the fact that something must be done to address vulnerabilities. But…View More New Vulnerability Risk Model Promises More-Efficient Security
Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context of a browser for the first time. The new…View More New Class Of SQLite Exploits Open Door To iPhone Hack