Top

Category: Vulnerabilities


Threats & Malware, Vulnerabilities

Intel: More Than 90% of Our Vulnerabilities Found via Research

March 3, 2021

Via: Dark Reading

For the second year in a row, the vast majority of vulnerabilities — 92% — found in Intel’s products came from the company’s security investments, specifically internal research efforts and external bug bounties, the company stated in a new report, […]


Threats & Malware, Vulnerabilities

Update Your Chrome Browser Now! Zero-Day Actively Exploited in the Wild

March 3, 2021

Via: Hot for Security

A new zero-day vulnerability has been discovered in the popular web browser Chrome, with Google noting that the flaw is being exploited by malicious actors. Users should install the updated version of the browser containing the patch as soon as […]


Threats & Malware, Vulnerabilities

Microsoft Patches Four Zero-Day Flaws in Exchange

March 3, 2021

Via: DataBreach Today

Microsoft issued emergency software patches on Tuesday for four zero-day vulnerabilities in its Exchange email server, one of the most widely used pieces of enterprise infrastructure. The company says it believes the flaws have been exploited by a China-based group […]


Hacker, Threats & Malware, Vulnerabilities

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

February 25, 2021

Via: The Hacker News

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems. “Threat actors aligned with the Chinese Communist Party’s state interests delivered a customized malicious Mozilla Firefox […]


Threats & Malware, Vulnerabilities

Warning on security risk from virtual events platforms

February 24, 2021

Via: Computer Weekly

While the SolarWinds breach has shone a light on the dangers of supply chain attacks over the past three months, threat researchers at SME specialist security firm Huntress say the risks associated with the virtual events and conference platforms used […]


Threats & Malware, Vulnerabilities

Security + Fraud Protection: Your One-Two Punch Against Cyberattacks

February 23, 2021

Via: Dark Reading

Over the past year, the pandemic has accelerated the digital transformation that was already well underway at many organizations. Of course, with more business being conducted online comes the potential for more online fraud — and fraudsters have wasted no […]


Threats & Malware, Vulnerabilities

Research Shows How Solar Energy Installations Can Be Abused by Hackers

February 17, 2021

Via: Security Week

The targeted device is the ConnectPort X2e made by Digi International, a US-based company that provides IT, networking and IoT solutions for industrial, enterprise and smart city applications. FireEye conducted its research on a version of the device offered by […]


Threats & Malware, Vulnerabilities

Report Highlights Cyber Risks to US Election Systems

February 12, 2021

Via: Security Week

The report by the Center for Internet Security, a nonprofit that partners with the federal government on election security initiatives, focuses on how hardware and software components can provide potential entryways for hackers. “We have to continue to get better,” […]


Threats & Malware, Vulnerabilities

Siemens Patches 21 More File Parsing Vulnerabilities in PLM Products

February 11, 2021

Via: Security Week

The biggest advisory covers 21 security holes affecting JT2Go, a 3D viewing tool for JT data (ISO-standardized 3D data format), and Teamcenter Visualization, which provides organizations visualization solutions for documents, 2D drawings and 3D models. These products are made by […]


Threats & Malware, Vulnerabilities

Intel Patches Tens of Vulnerabilities in Software, Hardware Products

February 10, 2021

Via: Security Week

The chipmaker’s Patch Tuesday updates for February 2021 were described in 19 advisories, including four that cover high-severity vulnerabilities. The list of high-severity flaws includes a privilege escalation issue in the Intel Solid State Drive (SSD) Toolbox, and a denial-of-service […]