Building secure applications requires much more than just the knowledge of developers, as a properly protected environment requires an adequate analysis and the use of good security tools. That isRead More →

Cybersecurity specialists reported that a group of threat actors is actively exploiting a critical vulnerability in Atlassian Confluence deployments on vulnerable Windows and Linux. These attacks aim to install webshellsRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Apple AirTag whose exploitation would allow threat actors to find the phone number of a target user and even redirectRead More →

VMware security teams confirmed that the vulnerability in vCenter Server tracked as CVE-2021-22005 has already been exploited in the wild in a chained manner with other bugs fixed in theRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Windows Platform Binary Table (WPBT) whose exploitation would allow threat actors to perform great damage on Microsoft systems launched fromRead More →

On Thursday, the security researcher known as Illusion of Chaos revealed multiple details about three zero-day vulnerabilities in iOS, ensuring that Apple received reports about these flaws for months andRead More →

Illegal online activities can occur in multiple variants and on any platform; it just takes attracting the attention of a group of unsuspecting users in such a way that theyRead More →

Let’s Encrypt is currently the most important certification authority for Transport Layer Security (TLS) encryption thanks to its sophisticated automated processes for validating, signing, installing and renewing certificates for secureRead More →