A research team has uncovered a critical vulnerability in the widely used third-party software that controls car airbags and other functions. Learn how this can
Discover the Duuzer backdoor trojan targeting organizations in Korea. Learn about its capabilities and how it operates through phishing or waterhole attacks.
Analyze the security vulnerability in Lenovo's System Update software that could allow local users to elevate their privileges. Learn about the technical detail