.

Vulnerabilities

New Research: 2020 Vulnerabilities on Target to Match or Exceed Last...

2020 vulnerabilities are on target to match or exceed last year as routine Patch Tuesday events begin to reach volumes comparable to January’s Vulnerability...

Cybersecurity vulnerabilities in millions of Smart Connected Devices

Security vulnerabilities found in the software used by millions of connected devices might lead to a catastrophic shutdown of the entire digital world in...

Research discovers new Mobile Browser security vulnerabilities

A study carried out by Rapid7 Inc has found serious security vulnerabilities in the mobile browsers that could allow hackers to fake any web...

Qualcomm Mobile Processors are vulnerable to Cyber Attacks

According to a study carried out by the security researchers from Check Point, over 40% of Android phones operating on Qualcomm Processors are vulnerable...

Reasons why Zoom App is being banned by governments across the...

As more and more corporate companies like Google, Amazon, and Microsoft are banning the usage of Zoom App in their work environments, followed by...

Hacker earns $75k for finding 3 critical vulnerabilities in Apple Safari...

Apple Inc has once again proved that it keeps its word when it comes to rewarding white hat hackers who find security flaws in...

LACK OF DILIGENCE BY LARGE ENTERPRISES CAN CREATE VULNERABILITIES

This post was originally published here by (ISC)² Management.While large enterprises are highly confident in their cybersecurity defenses, a new (ISC)² study suggests they...

Windows 7 users should be aware of these Cyber Security vulnerabilities

All you Windows 7 users out there, its better you make a note of the following cybersecurity vulnerabilities to which your system will get...

Vulnerabilities vs Misconfigurations

Vulnerability assessment is a necessary component of any complete security toolchain, and the most obvious place to start for anyone looking to improve their...

If You’re Only as Strong as Your Allies, Should You Trust...

Jim Ivers  wrote an interesting post about If You're Only as Strong as Your Allies, Should You Trust Third-Party Code? that I would like to...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!