
Blog Series
security vulnerabilites

Firefox 117 Addresses 4 Memory...
During its beta phase, Firefox 117 introduced an exciting new feature that was already present in other browsers – an integrated website translation engine that performs all translations locally within...
Two Critical OpenSSH Vulnerabilities...
Two critical security vulnerabilities were recently addressed in OpenSSH that allow remote code execution (RCE). They are identified as CVE-2023-28531 and CVE-2023-38408, and both have received the base score of...
Linux malware infects 70,000...
A stealthy Linux malware called AVrecon has been used to infect over 70,000 Linux-based small office/home office (SOHO) routers, according to a report by Lumen’s Black Lotus Labs threat research...
Zimbra warns of critical zero-day...
Zimbra has warned of a critical zero-day security flaw in its email software that has been actively exploited in the wild. The vulnerability, which has been assigned the CVE identifier...
Microsoft discloses espionage attempt by...
Microsoft has revealed that a China-based hacking group, dubbed Storm-0558 was behind the calculated attempt to infiltrate email systems for intelligence collection purposes. The group breached email accounts of approximately...
SonicWall issues patch for vulnerabilities...
SonicWall has issued an urgent patch for critical vulnerabilities in its Global Management System (GMS) and Analytics network reporting engine software suites after they were discovered by the NCC Group....
Meduza malware targets browsers, password...
A new malware dubbed Meduza Stealer has been discovered to be targeting Windows operating systems, and identified as a stealer of information from a large number of browsers, password managers,...
StackRot Vulnerability in Linux Kernel...
A new vulnerability, called StackRot, was discovered by a security researcher, Ruihan Li, in the Linux kernel’s memory management subsystem. The incorrect lock handling for accessing and updating virtual memory...
Inky uncovers malicious QR codes...
According to Inky Technology Corp., image-based emails with integrated Quick Response (QR) codes are being used in phishing attacks. To fool receivers more readily and collect critical information, the attackers...
Samsung smartphones affected by six...
Six vulnerabilities affecting Samsung mobile devices have been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalogue. Samsung addressed all of the vulnerabilities in 2021,...
MITRE reveals 25 most dangerous...
MITRE has announced its list of the top 25 most dangerous software vulnerabilities that have afflicted the industry over the last two years, after rigorously evaluating and scoring each weakness...