Search results
A vulnerability has been disclosed in the Microsoft JET Database Engine that could allow remote code execution by an attacker.
A new campaign has been observed using the Windows Management Instrumentation Command-line (WMIC) tool to install a variety of different malware.
MadoMiner is a newly observed cryptocurrency mining worm that uses large portions of the ZombieBoy remote access trojan's code.
First observed in 2018, iTranslator is an information stealing trojan that uses a pair of software drivers to gain control of an affected system.
The Internet Systems Consortium (ISC) has released a security advisory that addresses a vulnerability affecting multiple versions of ISC Berkeley Internet Name Domain (BIND).
Intel have released an update to address a vulnerability in their Converged Security Manageability Engine (CSME, also known as ME). An unauthenticated local attacker could exploit this vulnerability to gain access to or alter security keys.
Google has released Chrome version 69.0.3497.92 for Windows, Mac, and Linux. This version addresses vulnerabilities, one of which an attacker could exploit to take control of an affected system.
Google has released Chrome version 69.0.3497.81 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
Details of a vulnerability in SnapCreek's Duplicator WordPress plugin have been disclosed by a group of security researchers.
On October 11, 2018, the Internet Corporation for Assigned Names and Numbers (ICANN) will be changing the Root Zone Key Signing Key (KSK) used in the Domain Name System Security Extensions (DNSSEC) protocol.