Everything there is to find on tag: vulnerabilities.

Lucifer malware makes use of old vulnerabilities for attacks
A new cybercriminal operation has found moderate success according to a statement released by Palo Alto Netwo...
Everything there is to find on tag: vulnerabilities.
A new cybercriminal operation has found moderate success according to a statement released by Palo Alto Netwo...
Users of Adobe Flash Player will soon receive a notification to uninstall the software before the end of the ...
The majority of critical vulnerabilities in Google Chrome are attributed to faulty memory usage, Google techn...
A Dutch researcher found a way to bypass the security of the Thunderbolt 3-ports. The results were published ...
Videocall app Zoom was already under a magnifying glass in the United States at the end of March, after quest...
The Google Bounty program provides financial compensation to finders of vulnerabilities. The program had a re...
Vulnerabilities in several WordPress plugins (including Simple Fields) allow hackers to inject JavaScript cod...
Dropbox discovered 264 vulnerabilities after a one-day bug hunt in Singapore, where hackers from ten countries...
Attackers have exploited serious vulnerabilities in two commonly used WordPress plug-ins in the wild. These ar...
A group of academics from South Korea has discovered 36 new vulnerabilities in the Long-Term Evolution (LTE) s...