Cyber Security
Following our report that certain push-button phones sold in Russia were found to contain backdoors and trojans, the country’s DNS chain of stores, which sells...
Hi, what are you looking for?
Following our report that certain push-button phones sold in Russia were found to contain backdoors and trojans, the country’s DNS chain of stores, which sells...
Netgear has released firmware updates for more than a dozen of its smart switches used on corporate networks to address high-severity vulnerabilities. The company...
A critical vulnerability in a Cisco product designed to help service providers and enterprises deploy virtualized networks can allow unauthenticated actors to bypass authentication. The security...
The team behind TensorFlow, Google’s popular open source Python machine learning library, has revoked support for YAML due to an arbitrary code execution vulnerability. YAML is...
A security vulnerability in popular dating app Bumble could have enabled attackers to pinpoint other users’ precise location. Using fake Bumble profiles, security researcher...
A Russian cybersecurity firm subject to US government sanctions has hailed the restoration of vulnerability credits to its security researchers after they were mysteriously removed from...
Critical vulnerabilities in elFinder, the popular open source web file manager, can enable unauthenticated attackers to execute arbitrary PHP code on servers hosting elFinder’s back-end PHP...
A vulnerability has been discovered in Fortinet’s web application firewall (WAF) that allows attackers to run arbitrary commands on devices and servers running the...
Security flaws in chipsets used by more than 65 IoT device manufacturers have been identified by researchers. The vulnerabilities affect WiFi-enabled devices using a software development...
A bug on Ford Motor Company’s website allowed for accessing sensitive systems and obtaining proprietary data, such as customer databases, employee records, internal tickets, etc. The data...
Recent Comments