Samsung’s Exynos Auto 8890 Powers In-Vehicle Infotainment System in the New Audi A4 and Upcoming Models

Samsung Electronics, a world leader in advanced semiconductor technology, today announced that its Exynos Auto 8890 processor will be powering

Read more

BlackSquid Backdoor Malware

BlackSquid is an advanced modular backdoor primarily targeting financial and governmental organisations globally. It makes use of at least eight

Read more

A Look At Apple iOS 13

Introduces Dark Mode, Advanced Photo and Camera Features, Sign In with Apple and an All-New Maps Experience San Jose, California

Read more

GNU Screen MScrollV Function Denial of Service Vulnerability [CVE-2015-6806]

CVE Number – CVE-2015-6806 A vulnerability in the MScrollV function of GNU Screen could allow an unauthenticated, remote attacker to cause a

Read more

Doxygen templates/html/search_opensearch.php Cross-Site Scripting Vulnerability [CVE-2016-10245]

CVE Number – CVE-2016-10245 A vulnerability in Doxygen could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS)

Read more

Linux Kernel ip6_ra_control Function NULL Pointer Dereference Vulnerability [CVE-2019-12378]

CVE Number – CVE-2019-12378 A vulnerability in the Linux Kernel could allow a local attacker to cause a denial of

Read more

BusyBox recv_and_process_client_pkt Function Denial of Service Vulnerability [CVE-2016-6301]

CVE Number – CVE-2016-6301 A vulnerability in the recv_and_process_client_pkt function of BusyBox could allow an unauthenticated, remote attacker to cause a denial

Read more

Microsoft Windows 10 – Version 1903 – May 2019

This article lists a few new and updated features and content that are of interest to IT Pros for Windows

Read more

Nansh0u Cryptomining Campaign

Up to 50,000 servers were infected over the past four months as part of a high-profile cryptojacking campaign known as

Read more

transfig fig2dev Utility Buffer Underwrite Vulnerability [CVE-2018-16140]

CVE Number – CVE-2018-16140 A vulnerability in the fig2dev utility of transfig could allow a local attacker to cause a

Read more
%d bloggers like this: