Adobe fixes zero-day exploit in e-commerce code: update now!
February 14 2022There's a remote code execution hole in Adobe e-commerce products - and cybercrooks are already exploiting it.
Read moreThere's a remote code execution hole in Adobe e-commerce products - and cybercrooks are already exploiting it.
Read moreLatest episode - listen now!
Read moreThere’s a new ransomware that targets NAT devices made by QNAP:
The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended...
Read more
Log4j is being exploited by all sorts of attackers, all over the Internet:
At that point it was reported that there were over 100 attempts to exploit the vulnerability...
Read more
It’s serious:
The range of impacts is so broad because of the nature of the vulnerability itself. Developers use logging frameworks to keep track of what happens in a...
Read more
It was a zero-day bug until Patch Tuesday, now there's an anyone-can-use-it exploit. Don't be the one who hasn't patched.
Read moreGoogle researchers discovered a MacOS zero-day exploit being used against Hong Kong activists. It was a “watering hole” attack, which means the malware was hidden in a legitimate...
Read moreThe Israeli cyberweapons arms manufacturer — and human rights violator, and probably war criminal — NSO Group has been added to the US Department of Commerce’s trade blacklist. US...
Read moreA slew of security bulletins from Apple HQ, including 37 bugs listed as fixed in the initial public release of macOS Monterey.
Read moreLatest episode - listen now!
Read more
Recent Comments