The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own cloud vulnerabilities in their catalog. CVE-2023-6345 …
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…
Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…
Recent years saw a surge in cloud tech adoption, highlighting the efficiency through tools like Google's Domain-Wide Delegation. It enables…
For over two years, a hacker group linked to China had uninterrupted access to NXP, the Dutch chip manufacturer's computer…
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…
A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…
Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops. This led to the…