A team of researchers has disclosed information on a fresh flaw in Intel CPUs that lets attackers steal encryption keys and other sensitive data…
Srivani Reddy
Latest posts - Page 25
Systems Using RTLS Are Susceptible To MITM Attacks And Location Manipulation
Multiple UWB RTLS (real-time locating systems) vulnerabilities have been found by security researchers, giving threat actors the ability to conduct man-in-the-middle attacks and modify…
Update Zoom For Mac Right Away To Prevent The Root-Access Flaw
It’s time for a manual update if you use Zoom on a Mac. The most recent version to the video conferencing software closes a…
For The First Half Of 2022, There Were Almost 2,000 Data Breaches Reported
Flashpoint anticipates that the final numbers will be comparable, despite the fact that the number of breaches reported in the first half of 2022…
Argentina’s Judiciary Of Córdoba Hit By PLAY Ransomware Attack
The Córdoba Judiciary in Argentina has shut down its IT systems following a ransomware attack, which was allegedly carried out by the new ‘Play’…
Titan M Attacking with Only One Byte
Introduction Titan M, a security chip included by Google in its Pixel smartphones starting with the Pixel 3, was examined over the course of…
1,900 People Signal Phone Numbers Were Revealed By The Twilio Attack
Nearly 1,900 Signal users’ phone numbers were made public as a result of the data breach Twilio, a cloud communications provider, had at the…
Discord Desktop – Remote Code Execution
Discord RCE Because Discord was being used for their Prototype Pollution study collaboration, the electrovolt team made the decision to pwn it. Since Discord…
The Issue Of Cloud Isolation Is That Several Cloud Companies Are Impacted By PostgreSQL Flaws
How PostgreSQL-as-a-Service solutions from GCP, Azure, and other providers were found to have numerous connected vulnerabilities. The cloud has an isolation problem Tenant isolation…
Three Microsoft-Signed Boot Loaders Have UEFI Secure Boot Bypasses, According To Researchers.
Unsigned third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypassing of the UEFI Secure Boot feature have been found to have a…