Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components
May 06, 2024NewsroomAndroid / Data Security Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi...
May 06, 2024NewsroomAndroid / Data Security Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi...
CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini May 02, 2024 CISA adds GitLab Community and Enterprise Editions...
Security researchers in Adobe’s bug bounty program can now pick up rewards for finding vulnerabilities in Adobe Firefly and Content...
Sophos has released its annual State of Ransomware 2024 survey report, which found that the average ransom payment has increased...
The fifth Sophos State of Ransomware Report reveals the real-world ransomware experiences of 5,000 organizations around the globe, from root...
Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management...
The number of Microsoft vulnerabilities has mostly flattened in 2023, with elevation of privilege and identity attacks being particularly common,...
CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 25,...
The GPT-4 large language model from OpenAI can exploit real-world vulnerabilities without human intervention, a new study by University of...
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 25, 2024 U.S. CISA...
Apr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users'...
A Russia-based threat actor, known as APT28 or Forest Blizzard, has recently been exploiting a vulnerability, CVE-2022-38028 , within the...
Apr 18, 2024NewsroomContainer Security / Cryptocurrency Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to...
CISA adds D-Link multiple NAS devices bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini April 11, 2024 U.S. Cybersecurity...
Apr 09, 2024NewsroomVulnerability / IoT Security Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions...