skip to Main Content
Cyber Security: Windows 10 has a critical vulnerability, not yet patched
Microsoft confirmed. It has been dubbed “SMBGhost” and affects the Server Message Block (SMB) network…

Cyber Security: Windows 10 has a critical vulnerability, not yet patched

Microsoft confirmed. It has been dubbed “SMBGhost” and affects the Server Message Block (SMB) network communications protocol. It’s wormable and there are no mitigating factors.
Cyber Security, Citrix released the patch for the CVE-2019-19781 vulnerability
It covers the flaw in Application Delivery Controller (ADC) and Gateway. It’s imperative to install…

Cyber Security, Citrix released the patch for the CVE-2019-19781 vulnerability

It covers the flaw in Application Delivery Controller (ADC) and Gateway. It’s imperative to install it now. Meanwhile, cybercrime tried to exploit it, also with fake security tools as NOTROBIN.
Cyber ​​Security, new zero-day vulnerability discovered on Mozilla Firefox
Yoroi-Cybaze experts: The manufacturer has confirmed that it has already been used for targeted attacks…

Cyber ​​Security, new zero-day vulnerability discovered on Mozilla Firefox

Yoroi-Cybaze experts: The manufacturer has confirmed that it has already been used for targeted attacks in order to install malware. We recommend installing the security patch immediately.
WordPress, new plugin flaws: this time it’s up to wpDataTables Lite
The cyber security experts: There are two vulnerabilities linked to insufficient sanitization of user-supplied data,…

WordPress, new plugin flaws: this time it’s up to wpDataTables Lite

The cyber security experts: There are two vulnerabilities linked to insufficient sanitization of user-supplied data, that pose risks of XSS scripting and SQL Injection. Update it!
Microsoft increase cyber security of its products fixing 59 vulnerabilities
Nine of them were “Critical”, the others “Important” or “Moderate”. The first could allow an…

Microsoft increase cyber security of its products fixing 59 vulnerabilities

Nine of them were “Critical”, the others “Important” or “Moderate”. The first could allow an attacker to take control of an affected system, thanks to RCS. UPDATE the systems now!
Back To Top