The Conti ransomware gang is hacking into Microsoft Exchange servers and breaching corporate networks using recently disclosed ProxyShell vulnerability exploits. ProxyShell is the name of an...
Domain registrar MarkMonitor had left more than 60,000 parked domains vulnerable to domain hijacking. MarkMonitor, now part of Clarivate, is a domain management company that “helps establish and...
Vulnerabilities collectively referred to as BrakTooth are affecting Bluetooth stacks implemented on system-on-a-chip (SoC) circuits from over a dozen vendors. The set of issues impact a...
Developers of Node.js have released a significant update to the technology that resolves five troublesome security vulnerabilities, including some that present a remote code execution risk. The Node.js patch...
The team behind TensorFlow, Google’s popular open source Python machine learning library, has revoked support for YAML due to an arbitrary code execution vulnerability. YAML is a general-purpose...
A security vulnerability in popular dating app Bumble could have enabled attackers to pinpoint other users’ precise location. Using fake Bumble profiles, security researcher Robert Heaton...
A critical security vulnerability in Microsoft’s Azure cloud database platform – Cosmos DB – could have allowed complete remote takeover of accounts, with admin rights to...
An industrial energy management system made by Delta Electronics is affected by several vulnerabilities whose exploitation could have serious consequences in a real world environment, according...
Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions. The makers of Parallels...
Cosmos DB is in serious trouble thanks to ChaosDB, a critical vulnerability in the Azure cloud database. It enables anyone to take remote control of your...
Recent Comments