When stolen materials are published online
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
167 articles
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
Hackers are actively exploiting a dangerous vulnerability in Google Chrome. With Chrome 88.0.4324.150, Google has patched the vulnerability.
Version 14.4 patches vulnerabilities that cybercriminals are actively exploiting. Install this update as soon as possible.
No one should be using the dead technology, and any websites that still use it need an update.
“Zyfwp,” an admin-level account with a hard-coded password, discovered in several networking devices made by ZyXel.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
Our technologies prevented an attack. Expert analysis revealed the exploitation of two previously unknown vulnerabilities. What you need to know.
Microsoft has released a patch for a critical RCE vulnerability in Windows Server systems.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
To ensure that a vulnerability disclosure doesn’t cause more problems than it solves, we recommend a few simple principles.
Microsoft has posted a security advisory about vulnerabilities in Adobe Type Manager Library, which are already being exploited by cybercriminals.
Microsoft has released a patch for newly discovered critical vulnerability CVE-2020-0796 in the network protocol SMB 3.1.1.
On this podcast, Dave and Jeff discuss Windows 7’s end of life, a bug in the Windows CryptoAPI revealed by the NSA, Las Vegas hit with a cyberattack, and more.
Thanks to independent security researchers, we’ve fixed several security issues, protecting customers automatically.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Outsiders can penetrate your network through LAN sockets and devices in public areas.
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Six severe vulnerabilities in iMessage that allow remote code execution and data stealing with no user interaction? Sounds like a good reason to update to iOS 12.4 as soon as possible.
A newly discovered vulnerability allows hackers to eavesdrop on WhatsApp users, read their chats, and install spyware just by calling them. Update the app now!