Does the name ZombieLoad ring a bell with you? A new variant of the infamous ZombieLoad attack is around. ZombieLoad v2 enables attack on Intel CPUs which are designed to be resistant against the previously discovered MDS attacks. Zombieload v2 even affects processors in the latest Intel Cascade Lake CPU family. This new vulnerability is […]

Read More →

Adobe has released security updates as a part of its monthly cycle. There are a total of 11 vulnerabilities in four products. Three CVEs are rated critical and eight CVEs are rated important. An overall priority rating of 3 has been assigned to all the advisories. According to Adobe’s metrics, Priority 3 would mean “This […]

Read More →

Bluekeep is an exploit not unheard of. But, it is only in the recent times that an active exploitation of BlueKeep vulnerability has hit the headlines. Tracked as CVE-2019-0708, BlueKeep is a critical wormable remote code execution flaw in Remote Desktop Services patched by Microsoft in May 2019 Patch Tuesday Updates. Over 724,000 systems worldwide […]

Read More →

QSnatch, the new malware in town has already affected thousands of devices and wouldn’t call it quits. This malware was first discovered in October 2019 by the National Cyber Security Center of Finland (NCSC-FI) after it received reports via the Autoreporter service indicating the communication of infected QNAP NAS devices with specific command and control […]

Read More →

A new set of vulnerabilities were identified and fixed by Cisco, the most critical of which could allow a remote attacker to take control of the system. Likewise, security updates are now available for Cisco’s products which include eight advisories rated high in severity and seven rated medium. One of the high severity bugs allow […]

Read More →

Google has released an emergency update for Chrome with a warning that an exploit exists in-the-wild. There are two vulnerabilities rated high in severity and one of them has been reported as a zero-day. CVE-2019-13721 and CVE-2019-13720 are use-after-free issues in PDFium library and audio component respectively. An attacker can trick a user into visiting […]

Read More →