Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 17
The GandCrab ransomware continues to virulently spread and adapt to shifting cyber-conditions, most recently crawling back into relevance on the back of several large-scale spam campaigns.
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation flaw into their Intel-based products.
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light on IoT security.
An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone.
In total, Microsoft’s May Patch Tuesday roundup included 68 security patches, with 21 listed as critical, 45 rated important and two listed low in severity.
The flaws would leave the enterprise devices helpless to a range of remote threats, including the charms of the Reaper IoT botnet.
Adobe fixed critical vulnerabilities in Adobe Flash Player and Creative Cloud as part of its regularly scheduled May Security Bulletin, on Tuesday.
As companies continue to install the vulnerable version of Apache Struts behind the breach, Equifax has filed a clarification statement.
Hundreds of sites vulnerable to ‘Drupalgeddon 2.0’ have been impacted by a massive cryptomining campaign.
Lenovo warns of a high-severity bug impacting its System x line of servers, along with a medium-severity buffer-overflow vulnerability affecting its popular ThinkPad line.
... 131415161718192021 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...