A new set of security vulnerabilities have put major tech giants and security researchers on the run. Just a set of software updates should be able to fix this. Isn’t it? The answer would be a yes and no. So let’s find out. The systems using Intel processors can be exploited using a set of […]

Read More →

It’s Microsoft Patch Tuesday again! And this time, the security updates have addressed a total of 79 vulnerabilities with 22 rated as critical and 57 rated as important. And yet again, a little more than half of the vulnerabilities lead to Remote Code Execution. It is worthy to note that the updates addressed an actively […]

Read More →

Image Credit: threatpost.com Description: A remote code execution vulnerability exists in Microsoft SharePoint. This vulnerability, tracked as CVE-2019-0604 was reported by Markus Wulftange. This vulnerability was rated critical. However, no exploits were seen at the time of release. Now, a number of organizations reported active exploits of this vulnerability in regions of Canada and Middle […]

Read More →

Oracle released the quarterly critical patch updates in April 2019. And in less than a week, a zero-day was found exploiting in-the-wild. The vulnerability exists in Oracle Weblogic Server which has been targeted repeatedly due to its popularity and access to huge business sensitive information. What is the issue? A remote code execution vulnerability exists […]

Read More →

While we all breathed a sigh of relief after patching our systems against the two zero-days reported in the April Patch Tuesday, news broke out that one of them was actively exploited in the wild and could allow an attacker to completely compromise your system. This is another case of win32k.sys in jeopardy. This vulnerability, […]

Read More →

Adobe brought out its monthly set of security updates to address the vulnerabilities in its products. This month’s release consists of 43 vulnerabilities addressed in 8 advisories. 24 CVEs are rated critical, 18 CVEs are rated important and 1 CVE is rated moderate in severity. The critical vulnerabilities all lead to Arbitrary Code Execution which […]

Read More →