Who is the Network Access Broker ‘Wazawaka?’
In a great many ransomware attacks, the criminals who pillage the victim’s network are not the same crooks who gained the initial access to the...
The Dark Web: A Definitive Guide
The internet has opened up wonderful new possibilities in our world, making life easier on many levels. You can pay your bills, schedule your next...
What to Do If Your Identity Has Been Stolen
We live online these days, sharing everything from vacation pictures to what we eat for breakfast on the internet. The internet is also useful for...
Multiple Vulnerabilities in Adobe Products could allow for Arbitrary Code Execution.
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for Arbitrary Code Execution. Acrobat and Reader is a family...
A Vulnerability in Citrix Workspace App for Linux Could Allow for Local Privilege Escalation
A vulnerability has been discovered in Citrix Workspace App for Linux, a virtual desktop application. Successful exploitation of this vulnerability could allow for local privilege...
‘Wormable’ Flaw Leads January 2022 Patch Tuesday
Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving...
Apple’s Private Relay Is Being Blocked
Some European cell phone carriers, and now T-Mobile, are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot...
Critical Patches Issued for Microsoft Products, January 11, 2022
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
Multiple Vulnerabilities in Mozilla Firefox and Thunderbird Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR), and Thunderbird, the most severe of which could allow for arbitrary code...
Multiple Vulnerabilities in WordPress Could Allow for SQL Injection
Multiple vulnerabilities have been discovered in WordPress, the most severe of which could allow for SQL injection. WordPress is an open source content management system...