Cisco IOS XE Software Web UI Command Injection Vulnerability
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to...
Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an...
Cisco IOS XE Software Application Quality of Experience and Unified Threat Defense Denial of Service Vulnerability
A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software...
Cisco DNA Center API Insufficient Access Control Vulnerability
A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in...
Cisco Catalyst SD-WAN Manager Web UI HTML Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow...
Cisco Catalyst SD-WAN Manager Vulnerabilities
Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an attacker to access an...
Cisco Catalyst 9100 Access Points Denial of Service Vulnerability
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker...
Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability
A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent...
The pursuit of Mac-iness: 10+ gifts to pros in macOS Sonoma
The latest operating system for Macs, macOS Sonoma, is available now. Most Mac experts seem to be focused...
Red Cross-Themed Phishing Attacks Distributing DangerAds and AtlasAgent Backdoors
A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously undocumented...
US FTC hits Amazon with antitrust lawsuit on e-commerce business
The US Federal Trade Commission (FTC) has filed a lawsuit against Amazon, alleging that the company has been...
Reports about Cyber Actors Hiding in Router Firmware
On September 27, 2023, a joint cybersecurity advisory (CSA) was released detailing activities of the cyber actors known...
Researchers Uncover New GPU Side-Channel Vulnerability Leaking Sensitive Data
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage. “This channel...
Apple’s Eddy Cue testifies in Google’s confusing, secretive antitrust trial
On the same day that the US Federal Trade Commission sued Amazon for using anticompetitive and unfair strategies...
Personal Identity Verification (PIV) Interfaces, Cryptographic Algorithms, and Key Sizes: Drafts of SP 800-73-5 and SP 800-78-5 Available for Public Comment
In January 2022, NIST revised Federal Information Processing Standard (FIPS) 201, which establishes standards for the use of...
US may extend China waiver for South Korean chipmakers
At a time when the US and China are embroiled in a chip war, the former has assured...
‘Snatch’ Ransom Group Exposes Visitor IP Addresses
The victim shaming site operated by the Snatch ransomware group is leaking data about its true online location...
New Survey Uncovers How Companies Are Confronting Data Security Challenges Head-On
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches, new...
QR codes in email phishing
QR codes are everywhere: you can see them on posters and leaflets, ATM screens, price tags and merchandise,...
Don’t expect much from Copilot for Windows (yet)
“It just works.” That’s the mantra Steve Jobs applied to the Mac every chance he got. But it’s...