Newswires
March 1, 2023
Aruba Networks, a subsidiary of Hewlett Packard Enterprise, has released a security advisory to address six critical-severity vulnerabilities impacting multiple versions of ArubaOS.
March 1, 2023
Researchers from ESET have discovered a new stealthy Unified Extensible Firmware Interface (UEFI) bootkit, named BlackLotus, that is able to bypass Secure Boot on Windows 11.
March 1, 2023
Cisco has released security updates to address a critical security vulnerability (CVE-2023-20078) found in the Web UI of multiple IP Phone models.
March 1, 2023
Two critical vulnerabilities in several industrial IoT (IIoT) software products made by PTC have been patched.
February 28, 2023
Security researchers at Quarkslab have identified two serious security defects in the Trusted Platform Module (TPM) 2.0 reference library specification, tracked as CVE-2023-1017 and CVE-2023-1018, which provide pathways for an authenticated, local attacker to overwrite protected data in the TPM firmware and launch code execution attacks.
February 28, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2022-36537 (CVSS score: 7.5) to its Known Exploited Vulnerabilities Catalog.
February 27, 2023
Hackers are actively exploiting two critical-severity vulnerabilities in the Houzez theme and plugin for WordPress, two premium add-ons used primarily in real estate websites.
February 27, 2023
The RIG Exploit Kit is undergoing its most successful period, attempting roughly 2,000 intrusions daily and succeeding in about 30% of cases, the highest ratio in the service's long operational history.
February 24, 2023
Fortinet has provided clarifications following reports of exploitation attempts targeting the FortiNAC vulnerability CVE-2022-39952.
February 23, 2023
Rezilion announced today the release of their new research, "Hiding in Plain Sight: Hidden Vulnerabilities in Popular Open Source Containers," uncovering the presence of hundreds of docker container images containing vulnerabilities that are not detected by most standard vulnerability scanners and SCA tools.