Security

JekyllBot:5 flaws allow hacking TUG autonomous mobile robots in hospitals

Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. Researchers at healthcare…

4 years ago

Microsoft Partch Tuesday for April 2022 fixed 10 critical vulnerabilities

Microsoft Partch Tuesday security updates for April 2022 fixed 128 vulnerabilities, including an actively exploited zero-day reported by NSA. Microsoft…

4 years ago

NGINX project maintainers fix flaws in LDAP Reference Implementation

The maintainers of the NGINX web server project addressed a zero-day vulnerability in the Lightweight Directory Access Protocol (LDAP) Reference…

4 years ago

CISA adds WatchGuard flaw to its Known Exploited Vulnerabilities Catalog

The U.S. CISA added the CVE-2022-23176 flaw in WatchGuard Firebox and XTM appliances to its Known Exploited Vulnerabilities Catalog. The U.S.…

4 years ago

SuperCare Health discloses a data breach that Impacted +300K people

SuperCare Health, a leading respiratory care provider in the Western U.S, disclosed a data breach that impacted more than 300,000…

4 years ago

Microsoft’s Autopatch feature improves the patch management process

Microsoft announced a feature called Autopatch that will allow organizations to keep their systems up-to-date starting with Windows Enterprise E3 (July 2022).…

4 years ago

Dependency Review GitHub Action prevents adding known flaws in the code

Dependency Review GitHub Action scans users' pull requests for dependency changes and will raise an error if any new dependencies…

4 years ago

Securing Easy Appointments and earning CVE-2022-0482

Easy Appointments contained a very dangerous Broken Access Control vulnerability tracked as CVE-2022-0482 that was exposing PII. Another day, another…

4 years ago

SharkBot Banking Trojan spreads through fake AV apps on Google Play

Experts discovered malicious Android apps on the Google Play Store masqueraded as antivirus solutions spreading the SharkBot Trojan. Researchers from the…

4 years ago

15 Cybersecurity Measures for the Cloud Era

Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are…

4 years ago

This website uses cookies.