Security

CISA, NIST published an advisory on supply chain attacks

CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide…

5 years ago

Microsoft Defender uses Intel TDT technology against crypto-mining malware

Microsoft announced an improvement of its Defender antivirus that will leverage Intel's Threat Detection Technology (TDT) to detect processes associated…

5 years ago

10,000+ unpatched ABUS Secvest home alarms can be deactivated remotely

10,000+ unpatched ABUS Secvest home alarm systems could be remotely disabled exposing customers to intrusions and thefts. Researchers from Eye Security have…

5 years ago

Privacy and security in the software designing

The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information…

5 years ago

Cellebrite ‘s forensics tool affected by arbitrary code execution issue

Cellebrite mobile forensics tool Ufed contains multiple flaws that allow arbitrary code execution on the device, SIGNAL creator warns. Moxie…

5 years ago

Google Project Zero updates vulnerability disclosure policy moving to a “90+30” model

Google Project Zero security team has updated its vulnerability disclosure policy, it gives users 30 days to patch flaws before…

5 years ago

Critical RCE can allow attackers to compromise Juniper Networks devices

Cybersecurity provider Juniper Networks addressed a critical vulnerability that could be exploited by attackers to remotely hijack or disrupt vulnerable…

5 years ago

April 2021 Security Patch Day fixes a critical flaw in SAP Commerce

April 2021 Security Patch Day includes 14 new security notes and 5 updates to previously released notes, one of them…

5 years ago

Adobe addresses two critical vulnerabilities in Photoshop

Adobe has addressed security vulnerabilities in Adobe Photoshop, Adobe Digital Editions, Adobe Bridge, and RoboHelp. Adobe has fixed ten security…

5 years ago

Millions of devices impacted by NAME:WRECK flaws

Security experts disclosed nine flaws, collectively tracked as NAME:WRECK, affecting implementations of the DNS protocol in popular TCP/IP network communication…

5 years ago

This website uses cookies.