Tens of thousands of devices worldwide, including many industrial control systems (ICS), have been hit by the PseudoManuscrypt […]
The ImControllerService service of Lenovo laptops is affected by a privilege elevation bug that can allow to execute commands […]
Experts warn that threat actors are actively attempting to exploit a second bug disclosed in the popular Log4j logging library. […]
Nation-state actors from China, Iran, North Korea, and Turkey are attempting to exploit the Log4Shell vulnerability to in attacks in […]
IIS server vulnerable Threat actors are using a malicious Internet Information Services (IIS) Server module, dubbed Owowa, to […]