security update
BlackBerry patches Enterprise Server
A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading …
Oracle’s critical patch update advisory for October 2010
Oracle just released a new Critical Patch Update, a collection of patches for multiple security vulnerabilities. The update also includes non-security fixes that are required …
49 vulnerabilities fixed in record Patch Tuesday
In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …
Microsoft patches 11 vulnerabilities
Microsoft released nine security bulletins which include four critical and five important updates to address 11 vulnerabilities affecting Windows, Internet Information …
Adobe patches Flash Media Server
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …
Apple updates Java for Mac OS X 10.5 and 10.6
The latest Java updates from Apple deliver improved reliability, security, and compatibility for Java SE 6 and J2SE 5.0. Java for Mac OS X 10.5 Update 6 supersedes all …
Microsoft patches 34 vulnerabilities
In today’s massive Patch Tuesday Microsoft delivers 13 bulletins that fix 34 vulnerabilities targeting Windows, Internet Explorer, the .NET framework, Office, SQL …
Microsoft releases two security bulletins
Microsoft released two out of band security bulletins today – one Internet Explorer bulletin and one Visual Studio bulletin. The IE issue is rated critical and the …
Microsoft releases 11 security bulletins
Another Patch Tuesday and Microsoft comes out with a variety of patches, and this series is quite serious. Users are recommended to update as soon as possible. The critical …
Featured news
Resources
Don't miss
- Cozy Bear targets EU diplomats with wine-tasting invites (again)
- Funding uncertainty may spell the end of MITRE’s CVE program
- When companies merge, so do their cyber threats
- Strategic AI readiness for cybersecurity: From hype to reality
- Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques