Google recently unveiled a critical security update to their popular web browser, Google Chrome, addressing over a dozen significant security vulnerabilities. Chrome version 131 is now available in stable channels for Windows, Mac, Linux, and Android...
Humans make mistakes, software has bugs and some of these bugs are exploitable vulnerabilities. The existence of vulnerabilities in software is not a new problem, but as the volume of software in existence grows, so does the number of exploitable vulnerabilities. Learn more about this worrisome trend in an interesting Security Boulevard article.
Billions of smartphones, tablets, laptops, and Linux-based IoT devices are now using Bluetooth software stacks that are potentially susceptible a new security flaw. Titled as BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.
Security researchers have found that they can detect Linux kernel security fixes before they are released - information that could be used by malicious hackers to develop and deploy exploit code before patches are widely available.
The recent GRUB2 patches that were released to mitigate critical BootHole vulnerabilities also caused boot failure issues for some users. Luckily, fixes for these regressions have started appearing for some distros, including Debian and Ubuntu.
A dangerous vulnerability has been discovered in the default Linux KDE extraction utility called ARK that allows malicious actors to overwrite files or execute code on victims' computers by tricking them into downloading an archive and extracting it.
A dangerous new vulnerability has been discovered in Secure Boot that affects a huge number of Linux and Windows systems that use the UEFI specification during boot.
CERT-In is urging Google Chrome users to upgrade immediately to the new version of the Chrome browser to protect sensitive information on their machines and prevent contact spoofing and denial of service (DoS) attacks exploiting Chrome vulnerabilities.
Purdue University security researchers recently discovered a vulnerability affecting IoT devices running Bluetooth which could lead to spoofing attacks. The vulnerability has a broad impact on mainstream platforms that support BLE communications, including Linux, Android and iOS.
The project behind the Rust programming language has revoked all API keys from its crates.io package web app. These API keys were not randomly generated and were being stored in plain text.
A new report reveals that common home routers from Netgear, Linksys, D-Link and other vendors contain serious security vulnerabilities that even updates don’t fix. While Linux can be a very secure OS in theory, researchers have found that many of these vulnerable routers are powered by very old versions of Linux that lack support and are riddled with security issues as a result.
Have you heard that F5 has patched a severe security vulnerability in its BIG-IP product? The bug can be exploited by attackers over the Internet to gain access to the TMUI component, which runs on top of a Tomcat server on BIG-IP's Linux-based operating system.
Nvidia has released a set of security updates to remove six vulnerabilities in the Nvidia GPU Display Driver impacting both Linux and Windows machines.
Have you heard that VideoLAN has released a new version of VLC Media Player to resolve a critical security vulnerability that could eventually allow for remote code execution?
For the past two years, Intel CPUs have been under siege by an unending series of attacks that make it possible for cybercriminals to pluck passwords, encryption keys, and other secrets out of silicon-resident memory. New security research reveals that Intel's speculative execution flaws go deeper and are even harder to fix than we initially thought.