Trend Micro fixed some flaws in Trend Micro Home Network Security devices that could be exploited to elevate privileges or…
Apple has addressed three zero-day vulnerabilities in macOS and tvOS actively exploited in the wild by threat actors. Apple has…
The audio equipment manufacturer Bose Corporation said it was the victim of a ransomware attack that took place earlier this…
US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates…
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at…
Operators behind the Zeppelin ransomware-as-a-service (RaaS) have resumed their operations after a temporary interruption. Researchers from BleepingComputer reported that operators…
Researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be exploited for malicious purposes. Cybersecurity…
A misconfiguration issue in the software used by the Eufy video camera exposed private information and video streams of customers.…
The wormable CVE-2021-31166 vulnerability in the HTTP Protocol Stack of the Windows IIS server also affects WinRM on Windows 10…
The Alaska health department website was forced offline by a malware attack, officials are investigating the incident. The website of…
This website uses cookies.