Firefox, Chrome Updates Patch High-Severity Vulnerabilities

Mozilla and Google this week announced software updates for Firefox and Chrome that address multiple high-severity ...

iLeakage: New Safari Exploit Impacts Apple iPhones and Macs with A and M-Series CPUs

Oct 26, 2023NewsroomData Security / Vulnerability A group of academics has devised a novel side-channel attack dubbed ...

New iLeakage Attack Steals Emails, Passwords From Apple Safari

This attack bypasses standard side-channel protections implemented by browser vendors and can retrieve data from Safari, ...

Australia Focuses on Threat of Chinese Attack on Solar Power

Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime New Standards ...

9 vulnerabilities found in VPN software, including 1 critical issue that could lead to remote code execution

Cisco Talos has disclosed 17 vulnerabilities over the past two weeks, including nine that exist in a popular VPN ...

The Rise and Tactics of Octo Tempest: A Cyber Threat Analysis | Cyware Hacker News

Microsoft has been closely monitoring the activities of a threat group known as Octo Tempest. This group has emerged as ...

Citrix Bleed Exploit Lets Hackers Hijack Netscaler Accounts

The vulnerability arises from an unauthenticated buffer-related flaw in Citrix devices, which can be exploited to gain ...

UK Parliament Opens Inquiry into Cyber-Resilience

UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the ...

1 573 574 575 576 577 578 579 580 581 582 583 697