BrakTooth vulnerabilities threaten billions of devices around the world
A group of researchers has published information on 16 serious vulnerabilities, dubbed…
Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale
Bleeping Computer discovered that an exploit that uses the memory buffer of…
ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange
A dangerous vulnerability called ProxyToken has been discovered in Microsoft Exchange. An…
Microsoft warned of a critical vulnerability in Cosmos DB
Microsoft has warned thousands of Azure customers of a critical Cosmos DB…
LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities
The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam vulnerabilities to…
Over 2000 Exchange Servers Hacked Using ProxyShell Exploit
Researchers at Huntress Labs estimate that over the past few days, about…
Experts list 15 most attacked Linux vulnerabilities
Trend Micro has published a list of the top threats and most…
Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges
A security researcher known as jonhat discovered a 0-day vulnerability in Razer…
Attackers hacked the US Census Bureau using Citrix exploit
The Office of the Inspector General (OIG) reported that unknown attackers hacked…
Vulnerabilities in STARTTLS threaten popular email clients
At the USENIX conference, a group of German scientists announced the discovery…
List of suspects in terrorism that are monitored by the FBI leaked to the network
A copy of the FBI's Terrorist Screening Center (TSC) list has Leaked…
Hackers exploit ProxyShell vulnerabilities to install backdoors
Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities,…