Norwegian software firm Ibexa is urging users to apply a new patch immediately to resolve a sensitive data leak vulnerability impacting its Digital Experience Platform (DXP)....
It’s definitely no secret that antivirus software is an essential part of your computer. However, these threats don’t stop at your devices. For example, criminals that...
F5 has released hotfixes for its BIG-IP and BIG-IQ products, addressing two high-severity flaws allowing attackers to perform unauthenticated remote code execution (RCE) on vulnerable endpoints....
The Government Accountability Office found that the Pentagon “lacks an accountable organization and consistent guidance” for documenting and sharing details about reported cyber incidents. Although the...
The agency also suggested existing sectors be consolidated and that there is a need for some agencies to exercise greater authority over private-sector entities. Leading cybersecurity...
Major industry groups clashed on how CISA should define key terms in its rulemaking process to implement the federal incident reporting law. Providers of commercial information...
Malicious actors can stage cross-site scripting (XSS) attacks across the subdomains of a website if they can trick users of Chromium browsers into entering a simple...
HackerOne has revamped its policy guidelines to offer better protection from legal problems for ethical hackers acting in good faith. The Gold Standard Safe Harbor (GSSH)...
In this Help Net Security interview, Sami Khoury, Head of the Canadian Centre for Cyber Security, talks about how Canada is addressing today’s top threats, touches...
The Russian scooter-sharing service Whoosh has confirmed a data breach after hackers started to sell a database containing the details of 7.2 million customers on a...