• Home
  • BlOG
    • All Posts
    • Digital Threats
    • Vulnerabilities
    • Physical Threats
  • Trend Analysis
  • About Me
  • Contact
  • Home
  • Archive by Category "vulnerabilities" (Page 2)

Buffer overflow

Can fuzzing uncover unexplored vulnerabilities in winrar?

by EW in August 24, 2023August 26, 2023

• RAR, or WinRAR in its contemporary Windows form, has been popular in file sharing and software distribution circles for…

Recent News

Is microsoft’s august 2023 patch tuesday really adequate to stop cyberattackers? #exploitation #zeroday

by EW in August 11, 2023August 15, 2023

. It’s like putting a band-aid on a broken arm, Microsoft’s August 2023 Patch Tuesday is a small measure to…

Recent News

a blue firefox moon: upgrading every 28 days#firefox #vulnerabilities

by EW in August 6, 2023August 6, 2023

Source: https://nakedsecurity.sophos.com/2023/08/01/firefox-fixes-a-flurry-of-flaws-in-the-first-of-two-releases-this-month/ I’ve summarised this article for you: The latest full version of Firefox is out, and it marks the…

Recent News

1 billion malware programs: get the lowdown on #cyberthreats #malware

by EW in July 18, 2023July 18, 2023

Source: https://www.cshub.com/malware/articles/the-9-most-common-types-of-malware-and-the-worst-malware-attacks-in-history?utm_medium=RSS I’ve summarised this article for you: Malware has been a threat for as long as computers have been…

Digital Threats

microsoft patch tuesday: #zerodays #eop exploits & malicious drivers block

by EW in July 13, 2023July 13, 2023

Source: https://nakedsecurity.sophos.com/2023/07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/ I’ve summarised this article for you: This month, Microsoft released a patch for more than 100 vulnerabilities, including…

Digital Threats

#rootkits with #microsoft: malicious drivers targeting #gaming users in china on the rise

by EW in July 13, 2023July 13, 2023

Source: https://www.darkreading.com/attacks-breaches/researchers-discover-microsoft-signed-rootkit-for-loading-2nd-stage-kernel-module I’ve summarised this article for you: It’s outrageous that threat actors are getting away with using sophisticated rootkits…

1234

We Are Social

Latest Video

Top 3 Recent

No items were found matching your selection.

Latest Screenshots

No items were found matching your selection.

Most Popular

[products limit=”3″ class=” squadforce-products-style-1″ columns=”1″ orderby=”title” order=”ASC”]

Copyright © 2020 nK

Top Background Image Bottom Background Image

Search

Social Media Auto Publish Powered By : XYZScripts.com