A security vulnerability in the Linux kernel could allow external attackers to escalate privileges and execute malicious code.
Researchers found that TPM chipsets manufactured by Infineon create weak RSA key information, which could enable fraudsters to compromise corporate data.
A Belgian security researcher unearthed a massive WPA2 vulnerability that affects virtually all devices that connect to Wi-Fi networks.
Cybercriminals could launch remote attacks through thermal security camera vulnerabilities. The flaw, first found in FLIR, could also expose other systems.
New malware attacks are using popular router hardware to carry out proxy-based credential stuffing. Admins should regularly install firmware updates.
A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
The August Android Security Bulletin has been published, and it enumerates over 40 security risks that Google recently fixed in the Android OS.
A Controller Area Network (CAN) Bus standard vulnerability could impact the security of connected automobiles and other products.