Security specialists from Switzerland discovered a new type of attack on DRAM that there is no protection against today. Although the new attack has not yet been implemented as an exploit and has not yet been used by attackers, memory manufacturers...
vulnerabilities
Vietnamese cybersecurity expert Truoc Phan discovered Vulnerability in the tagDiv Composer plugin for CMS WordPress. The vulnerability was assigned the number CVE-2023-3169 and its exploitation allowed malicious code to be placed on more than 9,000...
Binary company discovered Supermicro’s legacy board management controllers (BMCs) have seven vulnerabilities that could allow attackers to gain control of servers. Image source: Pete Linforth / pixabay.com Motherboard control controllers are...
Arm has announced that vulnerabilities have been discovered in the drivers of its Mali-series GPUs that are being exploited by attackers and affecting a wide range of devices, including Google Pixel and other Android smartphones, as well as...
American researchers discovered A vulnerability exists in GPUs from Apple, Intel, AMD, Qualcomm, Arm and NVIDIA that allows websites with malicious code to steal data from other websites – this could include logins, passwords and other...
Apple has released an emergency software update that addresses three zero-day vulnerabilities that have been actively exploited by attackers. The bugs affected the Safari browser as well as software platforms for Apple Watch, iPhone, iPad and Mac...
Apple has released security updates for iOS, iPadOS, macOS, and watchOS that address zero-day vulnerabilities that could be used to deliver malware and spyware “maliciously prepared image” or attachments in another format. Image source:...
ASUS has fixed three critical vulnerabilities in its RT-AX55, RT-AX56U_V2, and RT-AC86U routers that could potentially allow attackers to take control of these devices without the necessary security updates. All three of these wireless router models...
Intel could face a class action lawsuit after disclosing information about the Downfall vulnerability, according to Tom’s Hardware, citing class action aggregator data. This is not surprising since the problem affects billions of processors...
A vulnerability in the popular archiver WinRAR became known last weekend and has been fixed in the new version 6.23. Subsequently, it turned out that the program before this update had another security hole that was exploited by hackers. The...
Cyber criminals exploit a vulnerability in the WinRAR archiver, although information about its existence has already been published and the developer has released an updated version of the program in which this vulnerability has been fixed...
A vulnerability has been discovered in the well-known WinRAR archiver, which is tracked under number CVE-2023-40477 — She was rated 7.8 out of 10 (high). Developers who were informed about the problem in advance have already fixed the bug in the...
Based on testing results from an updated version of AMD processor microcode that closes the recently identified Inception vulnerability, most workloads experienced almost no performance degradation. However, the unfortunate exception was a...
Microsoft cybersecurity experts have discovered a number of vulnerabilities in software development tools for programmable logic controllers (PLCs) – these devices are widely used in industry and hacking them has serious consequences. In...
PhD student at the Ruhr University Bochum (Germany) Johannes Willbold spoken at the Black Hat cybersecurity conference in Las Vegas and shared the results of examining three types of orbital equipment. As it turns out, many satellites do not have...
Intel recently released information about the Downfall vulnerability that affected multiple generations of proprietary processors. The company has released a firmware update that partially fixes the vulnerability, but there have been concerns about...
AMD has released information about the vulnerability codenamed Inception (CVE-2023-20569, AMD-SB-7005) discovered by researchers at ETH Zurich. It allows an attacker to steal sensitive data but offers very limited capabilities. Image source: amd.com...
The CEO of cybersecurity company Tenable Amit Yoran (Amit Yoran) made this public incidentThis illustrates Microsoft’s stance on cybersecurity “worse than you think” – The company neglects privacy concerns and unduly delays...
Unknown hackers exploited a zero-day vulnerability in Ivanti’s software for central management of corporate mobile devices and successfully conducted a cyberattack on the assets of 12 Norwegian government agencies. The developer has fixed the...
British cybersecurity expert and ESET employee Jake Moore (Jake Moore) spoke about the possibility of blocking any WhatsApp account – just contact technical support with a request and provide the phone number of a potential victim. Currently...