GhostToken flaw in Google Cloud Platform that could have enabled threat actors to conceal an unremovable, malicious application inside a victim account.
An investigation off-shelf packages housed in the NuGet repository indicated that 51 unique software components are susceptible to extreme vulnerabilities.
Microsoft has warned Windows 10 customers that it has received “a small number of reports” about attacks on its Netlogon protocol, which it patched in…
Haldiram foods were attacked by ransomware encrypting all their files, data, applications, and systems and demanded a ransom of USD 7, 50,000 for decrypting…
If you use the Firefox web browser on your smartphones, make sure it has been updated to version 80 or the latest available version on the Google Play…
A group of researchers has detailed a new timing vulnerability in Transport Layer Security (TLS) protocol that could potentially allow an attacker to break…
A new set of critical vulnerabilities uncovered in SAP’s Sybase database software can grant unprivileged attackers complete control over a targeted database…