OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the…
A critical Bamboo Data Center and Server vulnerability has been discovered with a critical vulnerability which has been given CVE-2024-1597…
Ivanti has been discovered with a new vulnerability on Ivanti Standalone Sentry that is associated with Remote code execution. The…
Microsoft is unifying its cloud domain for Microsoft 365 services under "cloud.microsoft" to streamline the user experience and administration, which…
New research has revealed that more than 900 websites had a serious misconfiguration, which exposed a massive 125 million user…
Google Chrome has been protecting users from malicious websites and files with Safe Browsing, which maintains a locally-stored list updated…
Race conditions arise when there is no insufficient synchronization with a shared resource allowing multiple threads to access it simultaneously.…
Apart from ChatGPT and Gemini AI which are the most popular Artificial Intelligence systems available to the public, there are…
COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding…
The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia's ‘Personas'…