A China-based ransomware operator has for the past week been actively exploiting the Log4j vulnerability in VMware Horizon, the desktop and app virtualization platform, Microsoft has...
Many small and medium-sized businesses (SMBs) mistakenly assume (hope?) their size makes them a less appealing target to hackers, without realizing cyber criminals are eager to exploit the...
Microsoft says threat actors could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology to access users’ protected data. The Microsoft 365 Defender...
The WordPress development team released version 5.8.3, a short-cycle security release that addresses four vulnerabilities, three of which are rated of high importance. The set includes...
Experimentation with ANSI escape characters on terminal emulators has led to the discovery of multiple high-severity DoS (denial of service) vulnerabilities on Windows terminals and Chrome-based...
The developers of WordPress have pushed out a security-focused update that addresses four significant security flaws in the content management software. More specifically WordPress 5.8.3 patches cross site scripting (XSS)...
A buffer overflow vulnerability in Apache HTTP Server could allow attackers to perform remote code execution attacks. The vulnerability (CVE-2021-44790) can be exploited via a carefully crafted request body that...
JFrog’s senior director of security research said the vulnerability has a root cause similar to Log4Shell. Security researchers from JFrog said on Thursday that they discovered...
The Federal Trade Commission (FTC) has issued a warning that it will pursue any company that fails to protect its customers’ data against ongoing Log4j attacks. ...
Microsoft has warned the security community that the Log4j vulnerabilities still represent a complex and high risk for companies across the globe, as this open-source component...
Recent Comments