Nvidia Squashes High-Severity Jetson DoS Flaw
If exploited, the most serious of these flaws could lead to a denial-of-service condition for Jetson products. Continue reading Nvidia Squashes High-Severity Jetson DoS Flaw
Collaborate Disseminate
If exploited, the most serious of these flaws could lead to a denial-of-service condition for Jetson products. Continue reading Nvidia Squashes High-Severity Jetson DoS Flaw
Cook County, Ill., home to Chicago, has left a database exposed since at least September that contained sensitive criminal and family-court records. Continue reading Criminal, Domestic Violence Case Info Exposed in Cook County Leak
A security flaw in TikTok could have allowed attackers to query query the platform’s database – potentially opening up for privacy violations. Continue reading TikTok Flaw Lay Bare Phone Numbers, User IDs For Phishing Attacks
Tom Kellermann, head of cybersecurity strategy for VMware Carbon Black, talks about the top security challenges facing the US government as a new presidential administration steps in. Continue reading Breaking Down Joe Biden’s $10B Cybersecurity ‘Down Payment’
The security vendor is investigating potential zero-day vulnerabilities in its Secure Mobile Access (SMA) 100 series. Continue reading SonicWall Breach Stems from ‘Probable’ Zero-Days
The new tools on Chrome and Edge will make it easier for browser users to discover – and change – compromised passwords. Continue reading Microsoft Edge, Google Chrome Roll Out Password Protection Tools
Up to 4,000 stolen files have been released by hackers who launched a ransomware attack against the Scottish Environmental Protection Agency on Christmas Eve. Continue reading Ransomware Attackers Publish 4K Private Scottish Gov Agency Files
Researchers have traced the origins of a campaign – infecting SQL servers to mine cryptocurrency – back to an Iranian software firm. Continue reading SQL Server Malware Tied to Iranian Software Firm, Researchers Allege
Researchers warn that attackers are collecting reconnaissance for future business email compromise attacks using Google Forms. Continue reading Google Forms Set Baseline For Widespread BEC Attacks
Cisco is stoppering critical holes in its SD-WAN solutions and its smart software manager satellite. Continue reading Critical Cisco SD-WAN Bugs Allow RCE Attacks