A high severity security vulnerability found in Qualcomm’s Mobile Station Modem (MSM) chips (including the latest 5G-capable versions) could enable attackers to access mobile phone users’...
Back before enterprises embraced the cloud and its many benefits, software was released every two years through a formal change management process or organizations would introduce...
This year, Gartner – the world’s leading IT research company – came out with a prediction that upon inspection says a lot about how the highest...
BlackBerry Limited released its 2021 BlackBerry Threat Report, detailing a sharp rise in cyberthreats facing organizations since the onset of COVID-19. The research shows a cybercrime...
Engineers at Google, Mozilla, and security firm Cure53 have come together to develop an application programming interface (API) that provides a systematic solution to HTML sanitization....
A Windows Defender bug creates thousands of small files that waste gigabytes of storage space on Windows 10 hard drives. The bug started with Windows Defender...
An established organized crime group has switched tactics by launching attacks on e-commerce stores that leverage cross-site scripting (XSS) exploits instead of traditional phishing lures. The group, dubbed...
Cloud communications company Twilio has now disclosed that it was impacted by the recent Codecov supply-chain attack in a small capacity. As reported by BleepingComputer last...
Newly discovered critical vulnerabilities in the Exim mail transfer agent (MTA) software allow unauthenticated remote attackers to execute arbitrary code and gain root privilege on mail servers with default...
A driver that’s been pushed for the past 12 years to Dell computer devices for consumers and enterprises contains multiple vulnerabilities that could lead to increased...