vulnerability

24 Articles
Sammie Heavens Unleashes Raw Vulnerability in New Track “Boys Lyrics”
South Africa

Sammie Heavens Unleashes Raw Vulnerability in New Track “Boys Lyrics”

Sammie Heavens Unleashes Raw Vulnerability in New Track “Boys Lyrics.” Sammie Heavens is back with a fresh, deeply personal single that is already...

Loki Taps Into Vulnerability With New Single “Khono Lami”
South Africa

Loki Taps Into Vulnerability With New Single “Khono Lami”

Loki Taps Into Vulnerability With New Single “Khono Lami.” South African rapper Loki has released a deeply personal new single titled Khono Lami,...

Tommy Yankees Leans Into Vulnerability on ‘Slow Down’
Nigerian Celebrity

Tommy Yankees Leans Into Vulnerability on ‘Slow Down’

Emerging Cameroonian artiste Tommy Yankees has kicked off his year with a new release titled ‘Slow Down‘—a slow-tempo, introspective record that captures his...

Vulnerability that allows full admin takeover found in premium WordPress theme
Tech

Vulnerability that allows full admin takeover found in premium WordPress theme

‘Motors’ allowed threat actors to take over admin accounts This enabled full website takeover The developers released a fix Motors, a premium theme...

Computer scientists discover new security vulnerability in Intel processors
Tech

Computer scientists discover new security vulnerability in Intel processors

To compute faster, a predictor in the computer processor anticipates certain calculation steps. Hackers can exploit these anticipations to bypass security barriers and...

ASUS DriverHub driver management tool targeted by RCE vulnerability
Tech

ASUS DriverHub driver management tool targeted by RCE vulnerability

A security researcher discovered a major flaw in ASUS DriverHub The flaw allows users to run malicious code remotely A patch was already...

Maximum severity vulnerability puts over 1200 SAP NetWeaver servers at risk of hijacking
Tech

Maximum severity vulnerability puts over 1200 SAP NetWeaver servers at risk of hijacking

SAP disclosed a 10/10 flaw in NetWeaver Visual Composer The bug allows threat actors to upload malware Researchers claim up to 1,200 instances...

ESET security scanner vulnerability used to deploy TCESB malware
Tech

ESET security scanner vulnerability used to deploy TCESB malware

Kaspersky observed a threat actor called ToddyCat abusing a bug in ESET’s cybersecurity solution The group used a now-patched flaw to deploy a...

China’s new underwater tool cuts deep, exposing vulnerability of vital network of subsea cables
Tech

China’s new underwater tool cuts deep, exposing vulnerability of vital network of subsea cables

Credit: Pixabay/CC0 Public Domain Chinese researchers have unveiled a new deep-sea tool capable of cutting through the world’s most secure subsea cables—and it...