Recently, vBulletin addressed a zero-day vulnerability that was quickly exploited. The bug appeared as a result of bypassing the patch for a previously known and fixed vulnerability. [more]
Heads up, Chrome users! A critical vulnerability exists in the Chrome browser that poses a security risk to users. Fortunately, Google has patched the bug before it could be exploited in the wild. Make sure to upgrade your devices to Google Chrome 81. [more]
VMware has disclosed another serious vulnerability affecting its vCenter Server. The vulnerability, upon exploitation, could lead to information disclosure. [more]
A Study of the top 150,000 Android Apps Reveals 12,706 to Contain a Variety of Backdoors Once again, numerous Android apps with suspicious behavior have surfaced online. [more]
A critical security vulnerability existed in Slack that could have lead to a massive data breach affecting its customers. Slack also fixed another vulnerability together with this one. [more]
A critical security vulnerability existed in Slack that could have lead to a massive data breach affecting its customers. Slack also fixed another vulnerability together with this one. [more]
Once again, Facebook has (unintentionally) breached users’ privacy. Facebook developed a glitch that exposed page admin accounts to the public. Though, it was a short-lived bug, people still managed to exploit it for numerous high-profile pages. [more]
Social media craze TikTok has now made it to the news owing to security issues. Researchers have found numerous vulnerabilities in the TikTok app that could risk users’ security. Exploiting the bugs could allow an attacker to add or delete users’ videos or alter privacy... [more]
Another threat to WordPress sites has surfaced online. Researchers have discovered some serious security vulnerabilities in the WP Database Reset plugin. What’s threatening with these vulnerabilities is their easily exploitable nature. [more]
A serious security bug affected numerous TP-Link routers. The vulnerability in TP-Link Archer routers could allow a potential attacker to remotely take over the device. [more]