The most popular macOS terminal emulator, iTerm2, has been modified to address a critical security issue that has not been disclosed for at least seven years. Attackers are able to…
Security
There are two security vulnerabilities within the NTLM authentication protocol in Microsoft that allow attackers to bypass MIC (Message Integrity Code). As part of the security updates released yesterday after…
Microsoft released October’s service stack reliability enhancements, which allows users to download and install Windows updates, for all versions of Windows 10. Microsoft says these Critical Service Stack Updates fix…
Software violation search page Have I Been Pwned added the software infringements from StreetEasy and Sephora privacy to their motor so that users can verify if their information has been…
At over two million detections to date, exploiting the infrastructure of shopping sites to steal payment card data is unlikely to end in the near future. These attacks are collectively…
Over half of the Comodo Forum users ‘ account information has been robbed and is now traded online. The violation was made possible by exploiting a weakness in the forum’s…
A fresh critical vulnerability was patched to avoid denial of service (DoS) or potentially remote code implementation assaults in the Exim mail transfer agent (MTA) software. The CVE-2019-16928 safety bug…
This week a vulnerability and approach to the execution of remote software in zero-day vBulletin has been openly exposed and used by poor performers to attack vBulletin forums. Cloudflare now…
Defense contractors Rheinmetall AG and DCC have been struck by cyber attacks this month that have affected and affected their IT systems. German Rheinmetall AG, with two operational parts, Rheinmetall…
In phishing campaigns, open redirects by Google and Adobe are used to give validity to URLs used in spam emails. An open redirect is a website URL which anybody can…