.

vulnerability

Chinese wireless cameras in UK are filled with espionage related software...

As per the survey conducted by consumer watchdog ‘Which’ more than 100,000 wireless cameras manufactured by Chinese company HiChip and installed in UK are...

Conduent ransomware attack and its Citrix Server Vulnerability

Conduent, a Business Process services company headquartered in New Jersey, America was reportedly hit by a ransomware attack on May 29th,2020. The company has...

A vulnerability in Google Cloud earns $31k

A security researcher from South America was awarded $31,337 as a bug bounty reward for finding a bug in the Google Cloud. And the...

New York Government dealt with Computer Vulnerability before Corona pandemic

Even before the dreaded Corona Virus spread its wings in New York, the government over there had to deal with an unreported emergency that...

Microsoft Windows document vulnerability has no fix

Microsoft has issued an official warning that the recently discovered font vulnerability has no fix as of now and users need to wait till...

Android vulnerability leads to malware scare

Kaspersky Lab has found a serious vulnerability in the Android operating system which can be used by hackers to launch malware attacks and steal...

Airtel mobile security vulnerability exposes data of 300 million customers

Airtel, which happens to be India’s third-largest Telecom Network is in news for all wrong reasons these days. The company which is reported to...

Microsoft fixes Azure Login Vulnerability

American Technology Microsoft has released a press statement yesterday stating that it has fixed a flaw on the login system of its Azure cloud...

Android phones come with pre-installed vulnerabilities

A new study made by security firm Kryptowire states that Android Phones are coming with pre-installed vulnerabilities that could impact smartphone users in a...

Real-time Vulnerability Alerting

This post was originally published by amol sarwate.Here at CloudPassage, we’ve been researching how public data can be used for real-time vulnerability alerting using...
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!