threat report

New Service Scans Chrome Extensions for Vulnerabilities and Privacy Risks

Over the past few years, hackers have increasingly abused Google Chrome extensions to steal people’s data, inject rogue ads into websites or hijack CPU power to mine cryptocurrency. Now, a new online ...
Security Boulevard
Microsoft Fixes 50 Flaws

Container Escape Vulnerability Puts Cloud Infrastructure at Risk

A serious vulnerability in runC, a tool used to spawn and run Linux containers, allows attackers to break out of containerized environments and gain full access to the underlying servers. RunC is ...
Security Boulevard