A security vulnerability that was initially documented as a Chrome bug is likely part of the attack chain employed by NSO Group's Pegasus spyware, and has been revised as a critical libwebp flaw in a new CVE ID filed by Google.
Security vulnerability that impacts an older form of a BlackBerry industrial systems OS, still in use in both industrial settings and hospital equipment, was discovered by Microsoft researchers in April of this year. Many are only now learning about it.
Check Point discovered another security vulnerability in Qualcomm chips affecting 40% of smartphones, allowing hackers to inject code in Android phones, including Google, Samsung, LG, Xiaomi, and One Plus brands.
A new FBI security alert indicates that a group of Iranian hackers are on a spree of compromising the BIG-IP products manufactured by F5 Networks.
Alexa bug allows hackers to access users' voice history, personal, and banking information. The vulnerability also allows hackers to install or uninstall Alexa skills on compromised accounts.
Recently Discovered SAP Bug Allows Anybody Without Technical Knowledge to Hack Business Applications
SAP bug allows a remote unauthenticated attacker to gain unrestricted access to SAP systems without a username or password to create new privileged users or shut down the entire system.
With the doubling of security vulnerabilities found in popular open source projects between 2018 and 2019, many are concerned on the record being broken again in 2020.