A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Current Activities

Red Hat Security Update

Red Hat has released security updates to address multiple vulnerabilities in Red Hat JBoss. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Red Hat Security Advisories: RHSA-2020:1336, RHSA-2020:1337 and apply necessary updates.

Read More »

Oracle Security Update

Oracle has released security updates for April 2020 to address 397 vulnerabilities across multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Oracle Security Advisories and apply necessary updates.

Read More »

Cisco Security Update

Cisco has released security updates to address vulnerabilities in multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review the following Cisco Security advisories: cisco-sa-voip-phones-rce-dos-rB6EeRXs , cisco-sa-ucsd-mult-vulns-UNfpdW4E, cisco-sa-wlc-gas-dos-8FsE3AWH, cisco-sa-wlc-capwap-dos-Y2sD9uEw, cisco-sa-webex-player-Q7Rtgvby, cisco-sa-mob-exp-csrf-b8tFec24, cisco-sa-iot-coap-dos-WTBu6YTq, cisco-sa-cucm-taps-path-trav-pfsFO93r, cisco-sa-airo-wpa-dos-5ZLs6ESz  and apply necessary updates.

Read More »

Apple Security Update

Apple has released security updates to address vulnerabilities to macOS Catalina 10.15.2 and later. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Apple Security Update Page and apply necessary updates.

Read More »

Chrome Security Update

Google has released new security updates to address vulnerabilities in Chrome version 81.0.4044.113 for Windows, Mac, and Linux. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Chrome Release Page and apply necessary updates.

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe