Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote […]
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote […]
A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow
A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository
A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated,
Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an attacker to access an affected instance
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause
A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to
The latest operating system for Macs, macOS Sonoma, is available now. Most Mac experts seem to be focused on the
A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously undocumented backdoors named
The US Federal Trade Commission (FTC) has filed a lawsuit against Amazon, alleging that the company has been engaging in
On September 27, 2023, a joint cybersecurity advisory (CSA) was released detailing activities of the cyber actors known as BlackTech.
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage. “This channel exploits an
On the same day that the US Federal Trade Commission sued Amazon for using anticompetitive and unfair strategies to maintain
In January 2022, NIST revised Federal Information Processing Standard (FIPS) 201, which establishes standards for the use of Personal Identity
At a time when the US and China are embroiled in a chip war, the former has assured South Korean
The victim shaming site operated by the Snatch ransomware group is leaking data about its true online location and internal
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches, new ways to
QR codes are everywhere: you can see them on posters and leaflets, ATM screens, price tags and merchandise, historical buildings
“It just works.” That’s the mantra Steve Jobs applied to the Mac every chance he got. But it’s a sentence
The funny thing about owning a Google Pixel phone is that you never know what interesting new treasures might be