Mar 22, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released eight Industrial Control Systems (ICS) advisories on Tuesday, warning of critical flaws affecting… Continue reading
Tag: Vulnerabilities
Mar 21, 2023Ravie LakshmananCyber Threat Intel / Vulnerability As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in… Continue reading
Mar 17, 2023Ravie LakshmananMobile Security / Firmware Google is calling attention to a set of severe security flaws in Samsung’s Exynos chips, some of which could be exploited… Continue reading
Feb 22, 2023Ravie LakshmananEndpoint Security / Software Update Apple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS, and macOS…. Continue reading
Feb 22, 2023Ravie LakshmananCyber Risk / Patch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities (KEV)… Continue reading
Feb 15, 2023Ravie LakshmananPatch Tuesday / Software Updates Microsoft on Tuesday released security updates to address 75 flaws spanning its product portfolio, three of which have come under… Continue reading
Feb 09, 2023Ravie LakshmananNetwork Security / IoT Security A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different… Continue reading
Feb 07, 2023Ravie LakshmananCyber Threat / Malware Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities…. Continue reading
Feb 01, 2023Ravie LakshmananServer and Cloud Security Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after… Continue reading
Feb 03, 2023Ravie LakshmananAutomotive Security / Vulnerability Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging stations… Continue reading