Insecure Redis Instances at Core of Attacks Against Linux Servers

Attackers are targeting insecure Redis instances, exposed to the internet, to access Linux servers and delete web files and folders in exchange for ransom. Continue reading Insecure Redis Instances at Core of Attacks Against Linux Servers

Lenovo Tells Users to Uninstall Vulnerable Updater

An advisory from PC maker Lenovo recommends that users uninstall Lenovo Accelerator Application, which includes components rife with security vulnerabilities. Continue reading Lenovo Tells Users to Uninstall Vulnerable Updater

Bloatware Insecurity Continues to Haunt Consumer, Business Laptops

High-severity vulnerabilities were found in pre-installed software updaters present in consumer and business laptops from vendors such as Dell, HP, Lenovo, Asus and Acer. Continue reading Bloatware Insecurity Continues to Haunt Consumer, Business Laptops