A team of researchers has disclosed information on a fresh flaw in Intel CPUs that lets attackers steal encryption keys and other sensitive data…
vulnerabilities
Vulnerabilities in Fujitsu Cloud Storage Could Allow Attackers To Access Backups
Unauthorized attackers were able to access backups thanks to serious security flaws in Fujitsu’s cloud storage infrastructure. The flaw specifically affected the FUJITSU ETERNUS…
Vulnerabilities plaguing Mitel IP phones
Cybersecurity researchers have shared details of two medium-security vulnerabilities in Mitel 6800/6900 desk phones, and if the vulnerabilities are successfully exploited, the attackers can…
Onapsis Research Labs has discovered three actively exploited SAP vulnerabilities
The Onapsis Research Labs keep a close eye on the changing threat landscape in order to better understand how commercial software like SAP and…
CISA Warns About Critical Vulnerabilities in Illumina’s DNA Sequencing Devices
The Food and Drug Administration (FDA) and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory concerning serious security vulnerabilities in…
Multiple Vulnerabilities are discovered In Open Automation Software (OAS) Platform
Open Automation Software, a major ICS platform, has a number of security flaws, according to researchers (OAS). Exploiting these flaws could lead to the…
CISA has added seven new vulnerabilities to the list of defects that have been exploited in attacks
The US Cybersecurity and Infrastructure Security Agency (CISA) has included seven new vulnerabilities to its list of actively exploited security concerns, including Microsoft, Linux,…
The top exploited vulnerabilities in 2021 have been revealed by cybersecurity firms
Cybersecurity authorities around the world have released a list of the top 15 vulnerabilities regularly exploited by threat actors in 2021, in collaboration with…
Android vulnerabilities are being exploited to register disposable accounts
A study of SMS phone-verified account (PVA) services has revealed a rogue platform with a botnet underneath. The rogue platform has infected thousands of…
Vulnerabilities let hackers control directory
Microsoft has pushed users to patch two security vulnerabilities in Active Directory domain controllers that it released in November. Microsoft has become active after…