vulnerability (Page 17)

Since its massive implementation, Bluetooth has become one of the most popular wireless connection technologies, allowing people to enhance their activities in a fully connected environment. Virtually any device isRead More →

An information security report points to the detection of two critical vulnerabilities in One Speaker, a popular smart speaker manufactured by technology firm Sonos. According to the report, the successfulRead More →

In its latest security update, Apple included fixes for a zero-day vulnerability that would have allowed threat actors to hack iPhone, iPad and Mac devices. The flaw was tracked asRead More →

Three critical remote code execution (RCE) vulnerabilities in the PHP Everywhere plugin could put more than 30,000 WordPress websites worldwide at risk. This plugin allows website administrators to insert PHPRead More →

Cybersecurity specialists report the detection of a critical zero-day vulnerability in Argo Continuous Deployment (Argo CD), a widely used Kubernetes tool for automation of the deployment of desired application statesRead More →

Cybersecurity specialists report that a Chinese hacking group is exploiting a critical zero-day vulnerability in Zimbra in order to access exposed email inboxes and obtain information related to European governmentsRead More →

Cybersecurity specialists report the detection of a set of critical vulnerabilities in the UEFI firmware of InsydeH20, used by technology companies such as Acer, AMD, ASUS, Dell, HP, Intel, LenovoRead More →

On Monday, the Cybersecurity and Infrastructure Security Agency (CISA) published a report detailing the detection of eight new security flaws in its Known Exploited Vulnerabilities Catalog, some of which couldRead More →

Cybersecurity specialists reported the detection of three vulnerabilities in PrinterLogic whose exploitation would allow threat actors to trace a remote code execution path on any connected endpoint. As you mayRead More →