operating systems

Exploiting vulnerabilities detected in previous versions of Log4j remains a severe issue, so the cybersecurity community is still looking for the best ways to prevent a cyberattack. However, some usersRead More →

One of the main skills that a hacker must have is to know how to hide their trail to prevent investigators or cybersecurity and digital forensics experts from detecting theirRead More →

Parallels Desktop developers announced the release of an alternative solution to mitigate the exploitation of a privilege escalation flaw in Parellels Desktop v16 and earlier software. The problem is thatRead More →

Section 52, the Microsoft group specializing in Internet of Things (IoT) security research, reported the finding of a set of critical flaws in the memory allocation process on IoT andRead More →