vulnerability (Page 17)

Information security specialists report the detection of multiple vulnerabilities in TIBCO BusinessConnect Container Edition. According to the report, the successful exploitation of these vulnerabilities would allow the deployment of multipleRead More →

Specialists from an Austrian university developed a formal security framework to analyze the security of web browsers. Dubbed as WebSpec, this project has already proved useful for the identification ofRead More →

Since its massive implementation, Bluetooth has become one of the most popular wireless connection technologies, allowing people to enhance their activities in a fully connected environment. Virtually any device isRead More →

An information security report points to the detection of two critical vulnerabilities in One Speaker, a popular smart speaker manufactured by technology firm Sonos. According to the report, the successfulRead More →

In its latest security update, Apple included fixes for a zero-day vulnerability that would have allowed threat actors to hack iPhone, iPad and Mac devices. The flaw was tracked asRead More →

Three critical remote code execution (RCE) vulnerabilities in the PHP Everywhere plugin could put more than 30,000 WordPress websites worldwide at risk. This plugin allows website administrators to insert PHPRead More →

Cybersecurity specialists report the detection of a critical zero-day vulnerability in Argo Continuous Deployment (Argo CD), a widely used Kubernetes tool for automation of the deployment of desired application statesRead More →

Cybersecurity specialists report that a Chinese hacking group is exploiting a critical zero-day vulnerability in Zimbra in order to access exposed email inboxes and obtain information related to European governmentsRead More →

Cybersecurity specialists report the detection of a set of critical vulnerabilities in the UEFI firmware of InsydeH20, used by technology companies such as Acer, AMD, ASUS, Dell, HP, Intel, LenovoRead More →