Home Search

vulnerability - search results

If you're not happy with the results, please do another search
Meta-Facebook-Image

Meta Alerts Users About Actively Exploited Freetype Vulnerability

Meta has warned users about the critical CVE-2025-27363 vulnerability in FreeType and has emphasized the need for swift patching to prevent exploitation.
Apple-MacOS-Sequoia

Microsoft: macOS Safari Vulnerability Exposes Sensitive Data

Microsoft has uncovered a macOS vulnerability in Safari that allowed unauthorized access to user data like the camera and microphone on MDM-managed devices.
ChatGPT Voice Assistant

OpenAI Faces Security Challenge with ChatGPT Memory Vulnerability

A vulnerability in ChatGPT, identified by researcher Johann Rehberger, allows malicious actors to hijack the AI memory settings to continuously siphon data. OpenAI has...
Windows-11-PC-Laptop-Desktop

Microsoft Addresses Exploited Zero-Day Data-Stealing Windows Vulnerability

The cybercriminal group Void Banshee has been exploiting a zero-day defect in Windows known as CVE-2024-43461, linked to the MSHTML engine, in their cyber...
Microsoft 365 Education

Microsoft Confirms Office Vulnerability, Patch Development Ongoing

Microsoft has disclosed a zero-day vulnerability affecting several versions of its Office suite, notably Office 2016, Office 2019, Office LTSC 2021, and Microsoft 365...
Hackers Cybersecurity Cyberattack Phishing

OpenSSH Vulnerability Puts Millions of Global Servers at Risk

Qualys security researchers disclosed a severe Open Secure Shell (OpenSSH) flaw that threatens millions of servers worldwide. The vulnerability, labeled CVE-2024-6387 and termed "regreSSHion,"...

ARM Discloses Exploited Vulnerability in Mali GPU Drivers

ARM Mali GPUs are being utilized in smartphones, tablets, Chromebooks, smart TVs, digital set-top boxes (STBs), automotive infotainment systems, wearables and others devices.

Citrix: Update XenCenter to Address PuTTY SSH Vulnerability

The flaw could be exploited under certain conditions, allowing an attacker with control over a guest VM to deduce the SSH private key.

Microsoft’s Security Pricing Strategy Sparks Controversy Amid Vulnerability Concerns

Microsoft criticized for charging extra for essential security features in its products like Microsoft 365, despite data breaches.
Security-Advanced-Threat-Protection-Microsoft

Microsoft Identifies Russian APT28 Exploiting Windows Vulnerability with GooseEgg Tool

Russian APT28 exploited a Windows flaw (CVE-2022-38028) since 2020 with a tool named GooseEgg to steal data.
Cyber-Security-Lock-Pixabay

Critical Vulnerability in PuTTY SSH Client Exposes Private Keys

PuTTY versions 0.68 to 0.80 have a critical flaw (CVE-2024-31497) that lets attackers steal private keys with just 60 signatures.
Hackers Cybersecurity Cyberattack Phishing

DarkGate Malware Campaign Targets Microsoft Windows Zero-Day Vulnerability

Hackers exploited a Windows zero-day (CVE-2024-21412) to deliver DarkGate malware via fake software installers.
Cyber-Security-Lock-Pixabay

Microsoft Finally Patches Windows Rootkit Vulnerability Exploited by North Korean Lazarus Group Hackers

A critical Windows flaw allowed Lazarus hackers to install a rootkit. Avast reported it in August 2023 but Microsoft took 6 months to patch
Cyber-Security-Lock-Pixabay

CISA Elevates Microsoft Streaming Service Vulnerability to KEV Catalog

CISA urgently warns of a critical Microsoft vulnerability (CVE-2023-29360) exploited in attacks.

Massive Vulnerability in Microsoft Exchange Threatens Tens of Thousands of Servers

Major Microsoft Exchange flaw impacts almost 100K servers, allowing attackers to bypass security and potentially steal data.

Microsoft Addresses Critical Azure Pipelines Vulnerability with Urgent Patch

Microsoft issues patch for critical Azure Pipelines flaw affecting open-source projects.
Microsoft-Defender-for-Individuals-On-Mobile-and-Desktop

Microsoft Introduces Vulnerable Components Inventory in Defender Vulnerability Management

Microsoft Defender expanded with a feature listing vulnerable components like Log4j, simplifying identification and fixing of software security risks.
How to manage Windows Security Tamper Protection feature on Windows 10

Windows Defender SmartScreen Vulnerability CVE-2023-36025 Bypassed by Phemedrone Stealer

New virus "Phemedrone Stealer" targets unpatched Windows machines, stealing data from browsers, wallets, and more.

Apple iOS Vulnerability Exposed by Kaspersky Points to iPhone Weakness

Kaspersky researchers discovered a critical hardware vulnerability in iPhones, impacting devices up to iOS 16.6.

Android 14 and 13 Users Warned of New Security Vulnerability

Android 14 and 13 have a lock screen bypass bug allowing access to private data if Google Maps' Driving Mode is enabled.

Recent News