Skip to content
  • coron
  • Connect :
  • clip
  • cheese
  • tumblr
  • takimura official site
  • coron
  • Connect :
  • clip
  • cheese
  • tumblr
  • takimura official site

TechWatch

Header Image
Category

vulnerabilities

6 Posts

Featured

Posted byWIRED
North Korean hackers stole nearly $400 million in crypto last year
Posted byDan Goodin
Backdoor RAT for Windows, macOS, and Linux went undetected until now
Posted byDan Goodin
Russia says it has neutralized the cutthroat REvil ransomware gang
Posted byFinancial Times
Ukraine says government websites hit by “massive cyber attack”

The Log4Shell zeroday 4 days on. What is it and how bad is it really?

  • Posted inBiz & ITlog4jlog4shellvulnerabilities
  • Posted byDan Goodin
  • 12/13/2021

If the max severity 0day hasn’t already dampened your xmas spirit it likely soon will.

The Internet’s biggest players are all affected by critical Log4Shell 0-day

  • Posted inBiz & ITexploitslog4jlog4shellvulnerabilities
  • Posted byDan Goodin
  • 12/11/2021

Seeing is believing. Critical Log4j vulnerability is an Internet-wide threat.

300,000 MikroTik routers are ticking security time bombs, researchers say

  • Posted inBiz & ITvulnerabilities
  • Posted byDan Goodin
  • 12/10/2021

Device owners have yet to install patches for 3 high-severity vulnerabilities.

Three iOS 0-days revealed by researcher frustrated with Apple’s bug bounty

  • Posted inAppleBiz & ITbug bountyinfosecvulnerabilitieszero-day
  • Posted byJim Salter
  • 09/25/2021

Public disclosure comes in wake of other grumblings about Apple’s bug bounty behavior.

Critical Cobalt Strike bug leaves botnet servers vulnerable to takedown

  • Posted inBiz & ITbotnetscobalt strikeexploitsTECHvulnerabilities
  • Posted byDan Goodin
  • 08/05/2021

New exploit available for download lets hackers crash Cobalt Strike team servers.

Feds list the top 30 most exploited vulnerabilities. Many are years old

  • Posted inBiz & ITexploitsFortinetmicrosoftpulseTECHvulnerabilities
  • Posted byDan Goodin
  • 07/29/2021

Hackers continue to exploit publicly known—and often dated—software vulnerabilities.

TechWatch
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close