Another Apache Log4j Bug Discovered – Patch Released – Update (Once Again!)
After the disastrous Log4j vulnerability disrupted the online world, another vulnerability surfaced online. It turns out that the first patch was ‘incomplete’,…
After the disastrous Log4j vulnerability disrupted the online world, another vulnerability surfaced online. It turns out that the first patch was ‘incomplete’,…
Given the rise in malicious and buggy drivers risking system security, Microsoft has developed an inclusive platform to help secure the kernel….
American healthcare equipment giant Hillrom has recently patched a serious zero-day vulnerability in its cardiac devices. Exploiting the bug could allow an…
This Tuesday marked the release of the last security updates from Microsoft for the year 2021. With December Patch Tuesday, Microsoft fixed…
Months after the announcement, Microsoft has released end-to-end encryption for all Microsoft Teams users. All Teams desktop users can now experience secure…
As the critical “Log4Shell” bug stirs up the internet, the cybersecurity community is rushing for fixes. Although Apache has patched the vulnerability…
In a recent wave of attacks, hackers targeted 1.6 million WordPress sites by exploiting unpatched exploits in multiple plugins. Huge Wave Of…
Card skimming and card details theft is one such innovative attack that seldom fails. Recently, researchers uncovered another active campaign exploiting WordPress…
The dedicated call center software GoAutoDial has recently addressed numerous critical vulnerabilities, including remote code execution. Numerous Vulnerabilities Spotted In GoAutoDial Researchers…
A highly critical vulnerability affecting the Apache Log4j library has potentially shaken the internet. This ‘Log4Shell’ vulnerability is already under attack and…
The popular communication platform Zoom continues improving its features as it increases its userbase. Recently, Zoom has rolled out the auto-update feature…
A team of academic researchers have developed a new HTTP fuzzing tool called ‘T-Reqs’. This tool employs deferential fuzzing to spot vulnerabilities….
Researchers from Google Project Zero have discovered numerous vulnerabilities in the Zoom app that could expose users to attacks. Zoom patched the…
Researchers have discovered a new cryptocurrency-related malware campaign in the wild. Identified as “SpyAgent, this malware exploits legit remote access tools (RATs)…
Serious security vulnerabilities affecting numerous HP printer models have been discovered which could wreak havoc if exploited. Dubbed “Printing Shellz”, these vulnerabilities…
Twitter already controls sharing of explicit or sensitive details, including personally identifiable or private information. However, it now expands its Information Policy…
Given the increasing incidents of ransomware attacks, multiple tech giants have joined hands to develop a thorough security measure. Dubbed the “Ransomware…
A security researcher from Google Project Zero discovered a critical and easily exploitable “BigSig” vulnerability in Mozilla NSS cryptographic library. Despite being…
Hackers are targeting business printers in ongoing campaigns to spread strange anti-work messages. It currently remains unclear as to why and how…
Multiple security flaws affected USB over Ethernet, which, in turn, affected numerous cloud services. These include the popular Amazon (AWS) Workspaces, NoMachine,…