Vulnerabilities & Exploits
- October 14, 2019The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an EU report supported by the European Commission
- October 11, 2019A zero-day vulnerability found in Apple iTunes and iCloud was exploited by cybercriminals to infect Windows computers of an automotive company with the BitPaymer ransomware.
- October 02, 2019A zero-day attack exploits an unpatched vulnerability. Until a patch becomes available, it is often a race between threat actors trying to exploit the flaw and vendors or developers rolling out a patch to fix it.
- September 30, 2019A security researcher discovered that an unpatchable exploit in the bootrom of iOS devices, including iPhone 4S to iPhone X, can be used to jailbreak the devices.
- September 24, 2019US-CERT and Microsoft recommend users and enterprises to update their systems with two emergency patches addressing IE and Defender vulnerabilities.
- September 24, 2019With the growing popularity of remote working arrangements in enterprises, we revisit the security threats and recommendations for IoT devices interchangeably connected to the network at home and in the office.
- September 23, 2019The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
- September 09, 2019Metasploit has published an exploit for the BlueKeep vulnerability (CVE-2019-0708), a much-discussed critical weakness that affects older versions of Microsoft Windows. The "wormability" of BlueKeep makes it dangerous, and id successfully exploited,
- August 27, 2019Our midyear security roundup highlights threats that made their mark in the first half of 2019, and provides security insights to help users and organizations determine the right solutions and defense strategies against them.