GLitch cyber attack
A new attack dubbed “GLitch” uses two different techniques, side-channel and rowhammer attacks, to compromise a web browser using WebGL.
GLitch cyber attack Read More »
A new attack dubbed “GLitch” uses two different techniques, side-channel and rowhammer attacks, to compromise a web browser using WebGL.
GLitch cyber attack Read More »
Twitter urged users on Thursday to reset their passwords after the company discovered a critical flaw in how passwords were stored unmasked in internal logs.
Twitter urges users to reset passwords Read More »
Cisco issued new security updates to address vulnerabilities on multiple Cisco products to include WebEx, Secure Access Control System (ACS), Wireless LAN Controller (WLC), Meeting Server, and Aironet.
Cisco security updates for multiple products Read More »
Microsoft issued a security advisory for a remote code execution (RCE) vulnerability that exists on the Windows Host Compute Service Shim (hcsshim) library, an open source tool used to import Docker containers and run on Windows systems.
Microsoft container tool patch Read More »
Tenable Research discovered a critical remote code execution vulnerability in Schneider Electric’s InduSoft Web Studio and InTouch Machine Edition.
Critical vulnerability discovered in Schneider Electric industrial software products Read More »
Security firm Trustlook has found at least 25,936 malicious apps using one of Facebook’s APIs, such as a login API or messaging API. Such malicious apps could then use and abuse a range of Facebook login profiles, such as name, location and email address, according to recent blog post.
Thousands of malicious apps use Facebook APIs Read More »
Microsoft has released two additional Windows security updates that address the Spectre side-channel vulnerabilities that were revealed in January of 2018.
Microsoft patches more Spectre vulnerabilities Read More »
Drupal issued a security advisory (SA-CORE-2018-004) on Wednesday to address a Highly Critical Remote Code Execution vulnerability (CVE-2018-7602). It is important to note this vulnerability is being exploited in the wild. An excerpt from the advisory:  “A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors
Drupal security update Read More »
A new vulnerability dubbed “Total Meltdown” was discovered last month after Microsoft issued patches to fix the previous Meltdown vulnerabilities.
Total Meltdown vulnerability exploit source code now on GitHub Read More »
A leaky Mongo database exposed nearly 25,000 personal records from a Bezop cryptocurrency server. Bezop is one of over 1,000 cryptocurrencies.
Leaky Mongo server exposes thousands of personal data records Read More »