Multiple Vulnerabilities in Google Chrome Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution. Google Chrome is a web browser...
WordPress 5.8.3 Security Release
This security release features four security fixes. Because this is a security release, it is recommended that you update your sites immediately. All versions since...
Norton 360 Now Comes With a Cryptominer
Norton 360, one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. Norton’s parent...
The Feeling of Safety
The internet’s greatest feat? Fundamentally shifting how we live. Once a revelation, it quickly set our long-standing beliefs about how we work, play, and connect...
Endangered data in online transactions and how to safeguard company information
This blog was written by an independent guest blogger. Online transactions are essential for every modern business. From online shopping to banking, transferring funds, and...
[R1] Nessus Network Monitor 6.0.0 Fixes Multiple Third-party Vulnerabilities
Nessus Network Monitor leverages third-party software to help provide underlying functionality. One of the third-party components (OpenSSL) was found to contain vulnerabilities, and updated versions...
Technical Analysis of CVE-2021-1732
Introduction In February 2021, the company Dbappsecurity discovered a sample in the wild that exploited a zero-day vulnerability on Windows 10 x64. The vulnerability, CVE-2021-1732,...
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
The Bug Report – December 2021
Your Cybersecurity Comic Relief Why am I here? If you’re reading these words, CONGRATULATIONS! You’ve made it to 2022! And even better, you found your way to...
[R1] Tenable.sc 5.20.0 Fixes Multiple Vulnerabilities
Tenable.sc versions 5.14.0 through 5.19.1 were found to contain a remote code execution vulnerability which could allow a remote, unauthenticated attacker to execute code under...