Research |news
Code injection and input validation vulnerabilities in F-Secure Internet Gatekeeper. Patch quickly
Cybersecurity specialists report the detection of two critical vulnerabilities in some versions of F-Secure Internet Gatekeeper. According to the report,…
Critical authentication bypass vulnerability in Trend Micro ServerProtect allows unauthorized remote user to become Admin
Cybersecurity specialists report the detection of a critical vulnerability in Trend Micro ServerProtect, one of the company’s most important security…
Two High severity vulnerabilities in Adobe Premiere Pro software affect million of devices
Information security specialists report the detection of two critical vulnerabilities in Adobe Premiere Pro, a timeline-based video editing software application…
High severity RCE vulnerability in Nitro Pro PDF software
Cybersecurity specialists report the detection of a critical vulnerability in Nitro Pro, an application used to create, edit, sign, and…
5 zero-day unpatched vulnerabilities in JBL TUNE500 BT Bluetooth headphones
Cybersecurity specialists report the detection of multiple vulnerabilities in the JBL TUNE500BT Bluetooth headset, one of the most popular models…
7 critical vulnerabilities in Istio, the open source service mesh. Thousands of microservices-based applications affected
Cybersecurity specialists report the detection of a set of vulnerabilities in Istio, the service network platform with open source technology…
2 Zero day vulnerabilities in Philips Tasy Electronic Medical Record software. Hospitals and clinics can easily become target of hackers
Cybersecurity specialists report the detection of two vulnerabilities in Philips Tasy Electronic Medical Record software. According to the report, the…
Serious security flaw in Cisco Secure Email and Web Manager
Cybersecurity specialists report the detection of a severe vulnerability in Secure Email and Web Manager, two popular security solutions developed…