FruityArmor APT Exploits Yet Another Windows Graphics Kernel Flaw
This is the second local privilege-escalation zero-day this APT group has exploited. Go to Source
This is the second local privilege-escalation zero-day this APT group has exploited. Go to Source
A brand-new approach to harvesting credentials hinges on users’ lack of cloud savvy. Go to Source
Adobe Digital Edition has four critical bugs enabling arbitrary code execution. Go to Source
From supply chain to orchestration tools, here are the new trends that DevOps should pay attention to in this year’s BSIMM report. Go to Source
A zero-day vulnerability tied to the Window’s Win32k component is under active attack, warns Microsoft. Go to Source
New Intel Coffee Lake CPUs offer hardware-based protections against some -but not all- Spectre and Meltdown variants. Go to Source
This year’s Virus Bulletin conference featured top-tier research from some of the world’s best threat intelligence experts. Go to Source
Cloud computing is creating new challenges among security professionals as attackers embrace the “as-a-service model”, giving unsophisticated cybercriminals a leg up in carrying out attacks. Go to Source
Google was caught not disclosing a potential data breach — leaving questions as to whether a lack of transparency is the new normal. Go to Source
Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers. Go to Source