Patch now, as researchers will publish a proof-of-concept exploit in January 2022.
Latest from Liam Tung
Meta targets coordinated inauthentic behavior on Facebook.
Analysts at Booz Allen Hamilton warn that Chinese espionage efforts could soon focus on encrypted data.
Linux remote access trojan hides behind the invalid date, February 31.
Hackers can exploit the flaw to give an attacker administrator rights on a compromised system.
And many attackers are installing cryptomining malware within 22 seconds of compromising cloud instances.
MediaTek fixes several flaws that attackers can exploit without user interaction.
Just because you're taking a break, that doesn't mean hackers will be too.
Facebook's messaging encryption plans move back by a year.
Iranian ransomware attacks are being launched in waves every six to eight weeks on average.