Researchers discovered a new attack vector that exploits CUPS, a printing system. By sending a single packet to a vulnerable CUPS service, attackers can...
Bluetooth technology, while convenient, has several vulnerabilities that can expose users to security risks.
Due to such flaws, security experts always advise users to keep...
XWorm, a multi-functional malware tool discovered in 2022, allows attackers to steal sensitive data, remotely access systems, and deploy other malware, whose versatility has...
Researchers uncovered a new malware campaign targeting microservice technologies, exploiting Docker for initial access and deploying cryptocurrency miners.
The attackers leveraged the kubelet API to...
SolarWinds' Serv-U file-transfer product was found to have a path-traversal vulnerability, which allows attackers to access files outside of the intended directory.
Despite the release...