Microsoft’s security researchers have uncovered a critical vulnerability in macOS. It enables hackers with root privileges to bypass System Integrity Protection (SIP). By exploiting…
Vulnerabilities
Vulnerability in Cisco ClamAV anti-malware scanner
A safety and security defect in a Cisco ClamAV anti-malware scanning device item has produced a significant safety and safety danger for some things…
KeePass vulnerabilities permit sneaky password stealing.
The KeePass development team is contesting what a recently discovered weakness that enables attackers to export the entire database in plain text covertly is.…
Samsung Galaxy Store App Is Vulnerable to Fraudulent App Installs
Two security holes have been identified in the Samsung Galaxy Store programme for Android, which a local attacker might use to install arbitrary apps…
Synology faced major security issues
Synology, a Taiwanese manufacturer of network-attached storage devices, has found a major security issue in its routers set up as virtual private network (VPN)…
60 thousand Exchange servers are vulnerable to ProxyNotShell attacks
More than 60,000 Microsoft Exchange servers that have been publicly exposed online have yet to be fixed against the CVE-2022-41082 remote code execution (RCE)…
The flaws in Amazon ECR Public Gallery
A critical security vulnerability in the Amazon ECR (Elastic Container Registry) Public Exhibition could have enabled assailants to deactivate any container image or inject…
Google Issues a Warning Regarding a ScarCruft Hacker-Used Zero-Day Vulnerability in Internet Explorer
An Internet Explorer zero-day flaw was actively exploited by a North Korean malicious attacker to target South Korean consumers by relying on the current…
Intel disputes the seriousness of the Data Centre Manager authentication flaw
Security expert receives a $10,000 bug bounty. Details of how a security researcher was able to breach Intel’s Data Center Manager ( Data Centre…
Checkmk IT infrastructure monitoring software has Vulnerabilities
The Checkmk IT Infrastructure monitoring software has vulnerabilities that have been publicly revealed and could be exploited by a remote, unauthenticated attacker to completely…