Threat Group Ramps-Up Attacks on Travel Sector in 2022
Corporate and customer data at risk, warns Proofpoint Read More
Researchers Find 35 Adware Apps on Google Play
Apps have millions of downloads, says Bitdefender Read More
Suspected Russian Money Launderer Extradited to US
Man allegedly handled over $400,000 in Ryuk proceeds Read More
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Monterey is the 18th and...
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Monterey is the 18th and...
ZDI-22-1114: Adobe FrameMaker SVG File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe FrameMaker. User interaction is required to exploit this vulnerability in that...
ZDI-22-1115: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability...
ZDI-22-1116: Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability...
ZDI-22-1117: (Pwn2Own) Linux Kernel route4_change Double Free Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code...
ZDI-22-1118: (Pwn2Own) Linux Kernel nft_object Use-After-Free Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute low-privileged code...