A new weakness has been disclosed in the WinRAR archiver utility for Windows that could be abused by a remote attacker to execute arbitrary code on targeted systems. Tracked as…
Zerodium an exploit purchase agency announced that it’s looking to buy zero-day exploits targeting popular VPN software. Specifically wants to acquire exploits that work against the Windows versions of the…
A highly sophisticated adversary named LightBasin active since 2016, has been identified as behind a string of attacks targeting the telecom sector with the goal of collecting "highly specific information"…
Google has released a new version of its flagship Chrome web browser with patches for a total of 19 vulnerabilities, including 16 reported by external researchers. The most severe of…
Brave is doing as its name suggests and taking the brave step of replacing Google search as the Brave browser's default search engine. Brave announced it was developing a privacy…
Researchers discovered an out-of-bounds read flaw in the Squirrel programming language, which attackers may exploit to bypass sandbox constraints and run arbitrary code within a SquirrelVM, allowing a malicious actor…
Microsoft has announced the commercial availability Privacy Management for Microsoft 365. Organizations that need to comply with privacy regulatory requirements have often done so via manual processes. Privacy Management for…
Cyber criminals using a new trick to lure their victims. Some phishing actors are observed using mathematical symbols on impersonated business logos to avoid detection by anti-phishing systems. Bypasses detection…