Everything there is to find on tag: vulnerabilities.
Tag: vulnerabilities
Timeline
SAP BusinessObjects BI platform can be accessed remotely
A critical authentication vulnerability allows hackers to remotely invade and completely abuse the SAP Busine...
Patch Tuesday fixes 6 actively exploited vulnerabilities
Microsoft's August Patch Tuesday update fixed 89 vulnerabilities. Among them were ten zero-day vulnerabilitie...
Ransomware victims recover data for free due to hackers’ bugs
According to research by Atropos.ai, six companies have escaped paying ransom for a ransomware attack because...
Half of businesses experience VPN-related attack
Figures from Zscaler show that in the past year, 56 per cent of organizations were targeted by attacks that e...
Thousands of iOS and macOS apps vulnerable to hacking attacks for ten years
Thousands of iOS and macOS apps have been vulnerable to hacking attacks for a decade. Although no attacks hav...
‘Substantial risk of malicious extensions in Chrome Web Store’
According to security researchers, the risk of users downloading a malicious browser extension from the Chrom...
Vulnerabilities in VMware’s vCenter Server enable remote code execution
VMware by Broadcom has disclosed two critical vulnerabilities in vCenter Server, a key component for managing...
Qwiet AI programming assistant suggests code improvements on its own
Developers working with the Qwiet AI platform will soon receive suggestions for improvement when the AI finds...
Cisco firewalls exploited by state-sponsored hackers
According to the security watchdogs of the United Kingdom, Canada and Australia, unknown state hackers have b...