A new set of security vulnerabilities have put major tech giants and security researchers on the run. Just a set of software updates should be able to fix this. Isn’t it? The answer would be a yes and no. So let’s find out. The systems using Intel processors can be exploited using a set of […]

Read More →

Alpine Linux is a simple and resource efficient OS which was built based on muscl and Busybox. Due to these optimized features, Alpine Linux behaves as a great docker container. A security vulnerability has been discovered in Alpine Linux docker image(since v3.3). Alpine Linux docker image has default root credentials with an empty or null […]

Read More →

It’s Microsoft Patch Tuesday again! And this time, the security updates have addressed a total of 79 vulnerabilities with 22 rated as critical and 57 rated as important. And yet again, a little more than half of the vulnerabilities lead to Remote Code Execution. It is worthy to note that the updates addressed an actively […]

Read More →

Image Credit: threatpost.com Description: A remote code execution vulnerability exists in Microsoft SharePoint. This vulnerability, tracked as CVE-2019-0604 was reported by Markus Wulftange. This vulnerability was rated critical. However, no exploits were seen at the time of release. Now, a number of organizations reported active exploits of this vulnerability in regions of Canada and Middle […]

Read More →

Oracle released the quarterly critical patch updates in April 2019. And in less than a week, a zero-day was found exploiting in-the-wild. The vulnerability exists in Oracle Weblogic Server which has been targeted repeatedly due to its popularity and access to huge business sensitive information. What is the issue? A remote code execution vulnerability exists […]

Read More →

A Zero-day vulnerability has been discovered in Internet Explorer that can allow attackers to steal files from the Windows systems. The vulnerability resides in the way Internet Explorer processes MHT(MIME HTML web archive) files and can be easily exploited by tricking users into opening a specially crafted MHT file. MHT is a Web page archive […]

Read More →