|
You are here |
www.syntaxbearror.io | ||
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | |
| | | | |
thehackernews.com
|
|
| | | | | Beware! Kinsing cryptojacking attacks are targeting Kubernetes clusters through misconfigured PostgreSQL. | |
| | | | |
www.theverge.com
|
|
| | | | | A sweeping investigation by 17 media outlets found that NSO Group's Pegasus software was used in hacking attempts on smartphones belonging to human rights activists and journalists. NSO markets its spyware to governments to track potential terrorists and criminals. | |
| | | | |
claroty.com
|
|
| | | Claroty researchers have discovered multiple vulnerabilities in popular industrial VPN-based solutions that provide remote access. Learn more. | ||