A class-action lawsuit had been filed against Intel due to a critical "Downfall" vulnerability in Intel CPUs, a defect that Intel was…
A notorious phishing service that supplied cybercriminals with phishing kits, scam pages, and stolen credentials has been disrupted by a…
SysAid On-Prem software has been reported with a 0-day vulnerability determined during an incident response investigation. According to Microsoft, attackers…
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities. The publicly available Proof…
Trusted Computing Group’s Trust Platform Module 2.0 reference library specification has been discovered with two buffer overflow vulnerabilities that threat…
Hackers actively target Confluence flaws because it is a widely used collaboration and documentation platform, making it a valuable target…
Proxy services let users rent IP addresses and provide online anonymity by disguising their traffic as regular IP addresses while…
Kubernetes is a popular open-source platform for managing containerized workloads and services. It's a system that simplifies a wide array…
Social media platforms offer financially motivated threat actors opportunities for large-scale attacks by providing a vast user base to target…
A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL…