Quick Emulator (or QEMU) is a cross-platform open-source emulator that performs hardware virtualization. QEMU is a free alternative to VMware. It is used by Xen, VirtualBox, KVM and is available for most Linux distributions. Vishnu Dev, a security researcher, discovered that an attacker can break out of a guest operating system and attack the host operating […]

Read More →

Apple has released an emergency patch to fix a flaw in the kernel component. Reports indicate that Apple had accidentally reverted a patch previously issued for this vulnerability in May 2019. The devices which had installed updates released in June 2019 were exposed to this vulnerability again. This vulnerability was discovered by Ned Williamson of […]

Read More →

Squid is an open-source web caching and Internet proxy application which is widely used for speeding up the webserver and aiding in its security. A heap buffer overflow vulnerability has been discovered in some versions of the Squid web proxy cache servers. This vulnerability is tracked as CVE-2019-12527 and could be exploited by attackers to […]

Read More →

What is HTTP/2 ? HTTP/2 is an updated version of the HTTP protocol and was released in 2015. After the changes in HTTP specifications in 1999, this was the next major update that was issued for HTTP. HTTP/2 is based on SPDY protocol which is used in popular products like Google Chrome , Mozilla Firefox, […]

Read More →

Adobe released its monthly set of security updates to address the vulnerabilities in its products. This month’s release consists of 119 vulnerabilities addressed in 8 advisories. 25 vulnerabilities are rated critical and 94 vulnerabilities are rated important. These vulnerabilities impact Adobe After Effects CC, Adobe Character Animator CC, Adobe Premiere Pro CC, Adobe Prelude CC, […]

Read More →

Microsoft is back with its monthly set of security updates, addressing a total of 96 vulnerabilities with 29 rated critical and 68 rated important. 36 vulnerabilities lead to remote code execution. 24 vulnerabilities can allow an attacker gain elevated privileges on your system. There are no reported zero-days this month and no publicly disclosed vulnerabilities. […]

Read More →