Items tagged with security

If you're a Chrome user, take note that the Cybersecurity and Infrastructure Security Agency (CISA) has identified and reported three zero-day vulnerabilities, and one of these flaws could affect you. The CISA reported that CVE-2025-4664 is already being exploited in the wild and that it impacts the Google Chromium... Read more...
Valve has responded to reports of a major data breach in which Underdark.ai, a cyber threat intelligent service, highlighted a dark web forum post by a hacker claiming to be in possession of 89 million Steam user records. According to Valve, which has been pretty good at keeping on top of security, there is nothing... Read more...
Intel is once again in the crosshairs of a fresh speculative execution exploit, this time dubbed "Branch Privilege Injection." The new vulnerability, revealed by researchers at ETH Zurich's COMSEC group, is capable of extracting sensitive kernel memory using techniques that bypass existing Spectre-class mitigations... Read more...
Heads up to all ASUS motherboard, prebuilt system, and laptop owners: if you're running the company's DriverHub software, be sure to update it to the latest version ASAP. The reason for this is an exceedingly nasty bug loitering in the utility that could easily allow for remote code execution. The vulnerabilities... Read more...
Are you holding on to an aging wireless router in hopes of stretching out the bang for your bucks? That's admirable—no sense in throwing away and filling up a landfill with electronics that are still useful—but depending on the model, it can also pose a security threat. So says the Federal Bureau of Investigation... Read more...
Data breaches, whether due to the nefarious activities of hackers or inadequate security measures, are a major concern due to the harm they can cause to affected users. In this latest breach, a report claims that the dating app Raw left user data unprotected, exposing private details for all to see. Raw was... Read more...
Nefarious hackers have figured out many ways to circumvent 2FA restrictions and harvest passwords with sophisticated phishing traps. Many of these bad actors, however, will soon be looking for new ways to attack Microsoft user accounts. Microsoft seems to have delivered on its earlier promise to push users a... Read more...
Do you use AirPlay to send videos from an iPhone, iPad, or Mac to a television or play music through a smart speaker? Then friends, you are in for a treat. Thanks to a vulnerability in not just Apple's operating system, but the ecosystem-wide AirPlay software development kit (SDK), over two billion devices are... Read more...
Concerns about the vulnerabilities of passwords are not new, and there have been recent moves to pivot to other secure alternatives, such as passkeys. A recent report has further highlighted that need. A cybersecurity firm reveals that hackers can now quickly crack passwords containing a mix of numbers, uppercase and... Read more...
Patch Tuesday, is sometimes a love hate sort of thing. It's a safe bet that most Windows Home or Pro users hate having to reboot it every time there's a hangnail that needs fixing. Regardless, those days are coming to an end, thanks to upcoming availability of in-memory hot-patching, as long as you're running Windows Server, which is obviously Read more...
Io_uring was introduced in 2019 with Linux kernel 5.1, and its purpose was to help improve the efficiency and flexibility of input and output operations on Linux. While this led to significant performance gains, it also led to critical blind spots for Linux security tools. Most recently, security researchers have... Read more...
A recent report has revealed that an employee surveillance app has been leaking sensitive information about employees and companies in a public storage resource, which raises the question as to the extent to which employers should be allowed to access employees' private data. WorkComposer is a surveillance app that... Read more...
Everyone knows (or should know) that the safest way to handle browser extensions is to make sure you're getting them from a trusted, reliable source. That alone isn't enough to ensure you want fall prey to hackers, though. Proving otherwise, dozens of extensions on the Chrome Web Store have been found to pose a... Read more...
Apple has released iOS 18.4.1 and iPadOS 18.4.1, which fixes two security flaws that impact the Return Pointer Authentication Code (RPAC) and CoreAudio. This update fixes some zero-day vulnerabilities that are already being actively exploited in the wild. Registered on the CVE program as CVE-2025-31200, one... Read more...
A recent report of a highly sophisticated phishing attack exploiting Google services targeting a lead developer at Ethereum Foundation, Nick Johnson, proves that internet users need to take more precautions to protect themselves from social engineering tactics like phishing. The attack's sophistication lies in... Read more...
Hertz Corporation has warned about an alarming data breach that might have exposed sensitive customer data to hackers. The rental car company has provided details of the breach, the measures it has taken, and what potentially affected individuals can do to safeguard their personal information, if needed. In a... Read more...
Google has unleashed a new security feature that will reboot your phone if it senses that it's been locked for three days. The enhancement appeared in the low-key release notes for Google Play Services v25.14 (2025-04-14). This "inactivity reboot" adds a layer of protection by encrypting files and data on a phone and... Read more...
Another day means another Windows update, and this time it comes with a warning from Microsoft. You may have noticed a new folder in your root C:\ folder after applying the latest cumulative update for April 2025. Furthermore, you may have been tempted to delete it after discovering that it's an empty folder. Word to... Read more...
End-to-end encryption on messaging apps can offer a degree of protection, that is, if you don't let down your guard. That's the essence of the NSA’s latest security warning to iPhone and Android users on the need to manage key settings that might expose them to attacks if not handled properly. While the warning... Read more...
Following the rollout of iOS 18.3 in January, Apple released iOS and iPadOS 18.4 updates, which contain 62 security fixes, including a fix for a critical flaw in iPhones, iPods, and iPads. Apple highly recommends users update their devices ASAP to be protected against these vulnerabilities. Among the updates, Apple... Read more...
The Clop ransom gang, notorious for masterminding sophisticated cyberattacks and exploiting zero-day vulnerabilities, is back in the news, and for the usual reason- - targeting the security systems of big companies and causing large-scale data breaches. The gang is claiming to have carried out an attack that breached... Read more...
We've reported a number of sophisticated cyberattacks where threat actors circumvent 2FA restrictions. In response to the increased vulnerability of passwords, Microsoft has announced a major change in its authentication requirements that will affect over a billion users. This change will see a significant shift from... Read more...
1 2 3 4 5 Next