Google Chrome Browser (137.0.7151.68/.69) Security Update Advisory

Google Chrome Browser (137.0.7151.68/.69) Security Update Advisory

Overview   Google has released an update to address a vulnerability in the Chrome(https://www.google.com/chrome) browser. Users of affected versions are advised to update to the latest version.   Affected Products   Chrome before version 137.0.7151.68 (Linux) Chrome before version 137.0.7151.68/.69 (Windows)   Resolved Vulnerabilities   Moderate Memory Free and Reuse

Google Android Family June 2025 Routine Security Update Advisory

Google Android Family June 2025 Routine Security Update Advisory

Overview   Google(https://www.google.com) has released a security update that fixes vulnerabilities in the Android family of products. Users of affected products are advised to update to the latest version.   Affected Products   Android Framework Android System Android Qualcomm Components   Resolved Vulnerabilities   Highly-rated local privilege escalation vulnerabilities in

ManageEngine (Exchange Reporter Plus) Product June 2025 Security Update Advisory

ManageEngine (Exchange Reporter Plus) Product June 2025 Security Update Advisory

Overview   Zoho(https://www.zohocorp.com/) has released a security update that addresses a vulnerability in its ManageEngine suite of products. Users of affected products are advised to update to the latest version.   Affected Products   Exchange Reporter Plus build 5721 and earlier   Resolved Vulnerabilities   A remote code execution vulnerability

Microsoft Edge browser (137.0.3296.52) version security update advisory

Microsoft Edge browser (137.0.3296.52) version security update advisory

Overview   Microsoft(https://www.microsoft.com) has released a security update that fixes vulnerabilities in products it has supplied. Users of affected products are advised to update to the latest version.   Affected Products   Microsoft Edge (Chromium-based) 137.0.7151.55/.56 and earlier Microsoft Edge 137.0.3296.52 and earlier   Resolved Vulnerabilities   Improper Functional Implementation

June 04, 2025

June 04, 2025 Hash 12e675da711647640eb4a470d12ae6330 2baab05105932312bc197ff1f26d08351 353a44fe51207f567fcd2ed15f176ff95 URL 1http[:]//allstarstriping[.]com/ 2https[:]//techmagazin[.]net/ 3https[:]//simone-et-andre[.]com/ IP 1196[.]251[.]71[.]131 2223[.]10[.]6[.]202 341[.]59[.]229[.]33...

Dell Product Update Advisory (CVE-2025-36564)

Dell Product Update Advisory (CVE-2025-36564)

Overview   We have released security updates to fix vulnerabilities in Dell products. Users of affected products are advised to update to the latest version.    Affected Products   CVE-2025-36564   Dell Encryption Admin Utilities Version: 11.10.2 and earlier     Resolved Vulnerabilities   Improper Link Verification Vulnerability in Dell

Google Product Update Advisory

Google Product Update Advisory

Overview   We have released security updates to fix vulnerabilities in Google products. Users of affected products are advised to update to the latest version.    Affected Products   CVE-2025-5419, CVE-2025-5068   Google Chrome (Windows, Mac) version: 137.0.7151.68/.69 or earlierGoogle Chrome (Linux) version: 137.0.7151.68 or lower     Resolved Vulnerabilities

Microsoft Edge browser (137.0.3296.63) version security update advisory

Microsoft Edge browser (137.0.3296.63) version security update advisory

Overview   Microsoft(https://www.microsoft.com) has released a security update that fixes vulnerabilities in products it has supplied. Users of affected products are advised to update to the latest version.   Affected Products   Microsoft Edge (Chromium-based) 137.0.7151.68/.69 and earlier Microsoft Edge 137.0.3296.63 and earlier   Resolved Vulnerabilities   Memory reuse after

Ransomware Disguised as Password Cracker (Extension Changed to .NS1419)

Ransomware Disguised as Password Cracker (Extension Changed to .NS1419)

The AhnLab SEcurity intelligence Center (ASEC) recently discovered ransomware being distributed disguised a password cracker tool. Such tools are typically used in brute force attacks.  Brute force attacks involve by trying every possible combination to find the correct password. Attackers repeatedly attempt to breach a system’s authentication procedure to steal