The IT giant, Apple has quietly patched a zero-day vulnerability which was recently discovered by a team of cyber-security researchers and hackers in the iOS kernel. Apple has patched this vulnerability in all of its operating systems across various devices along with iOS. The researchers who discovered the vulnerability released a new jailbreak package named […]

Read More →

  Although its not a Patch Tuesday, Adobe has released some of the emergency security updates to its products like Adobe Bridge, Illustrator, and Magento. So its time for all the users of these applications to be heedful. The software giant has announced the release of patches to its products in order to patch multiple […]

Read More →

A critical vulnerability has been discovered recently in QEMU (Quick Emulator). Beware of the Command execution vulnerability that exists in QEMU, a hosted virtual machine monitor. It was recently discovered that the QEMU Guest agent’s command ‘guest_exec‘ has encountered a critical OS command injection vulnerability which allows any remote unauthenticated attacker to gain sensitive information, […]

Read More →

Alpine Linux is a simple and resource efficient OS which was built based on muscl and Busybox. Due to these optimized features, Alpine Linux behaves as a great docker container. A security vulnerability has been discovered in Alpine Linux docker image(since v3.3). Alpine Linux docker image has default root credentials with an empty or null […]

Read More →

Spectre and Meltdown vulnerabilities are one of the most significant known hardware vulnerabilities that affect the modern computer processors. Meltdown and Spectre vulnerabilities were exploited through malicious programs to retrieve secrets stored in the memory of other running programs, sensitive information like passwords.   Both ‘Meltdown’ and ‘Spectre’ make use of a feature in the processor […]

Read More →

Overview: The Microsoft has re-released a patch for CVE-2017-8529 to fix a print issue related to this vulnerability. The patch is not fully applied unless certain registry keys are set even after installing the respective Operating System patches. This article describes the steps to update registry settings to be fully protected from this vulnerability.  Affected OS: […]

Read More →