MysterySnail crawls through zero-day vulnerability
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
186 articles
Our security technologies detected the exploitation of a previously unknown vulnerability in the Win32k driver.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
IT Security Economics 2021 report: Infosec’s top 5 challenges dealing with complex incidents.
Google released an update that patches three dangerous vulnerabilities in Google Chrome. Update your browser right away!
The Open Management Infrastructure agent, with four vulnerabilities, is being automatically installed on virtual Linux machines on Microsoft Azure.
An unpatched vulnerability in the MSHTML engine is enabling attacks on Microsoft Office users.
Malefactors are looking for vulnerable Confluence servers and exploiting CVE-2021-26084, an RCE vulnerability.
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Update all Windows systems immediately to patch CVE-2021-1675 and CVE-2021-34527 vulnerabilities in the Windows Print Spooler service.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
Our technologies detected targeted attacks involving a number of zero-day exploits.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Researchers discuss the new cybercriminal tactic of downloading outdated binaries onto modern computers and exploiting their vulnerabilities.
Prioritize updating the apps that keep your devices and personal data safe from cyberattacks.
A zero-day vulnerability in Microsoft Windows may already have been exploited.
To stop all threats to the corporate infrastructure, you have to do more than just protect workstations.
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Attackers exploit four dangerous vulnerabilities in Microsoft Exchange to get a foothold in the corporate network.
Hackers are actively exploiting a dangerous vulnerability in Google Chrome. With Chrome 88.0.4324.150, Google has patched the vulnerability.