Vulnerabilities in the Smarty PHP template engine could be exploited to achieve remote code execution (RCE) in third-party applications, a security researcher has warned. Two separate sandbox...
Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. Discussions on underground forums...
In multiple hearings, lawmakers sought solutions to pressing technology-based security issues. Throughout a series of Hill hearings covering various defense topics—the future of budgets, security threats...
Supposedly benign behaviors exhibited by JSON parsers can introduce a variety of security risks arising from how data is interpreted across multiple parsers, security researchers have found. Of...
An upcoming upgrade to WordPress will make it much easier for website owners to upgrade from HTTP to HTTPS. WordPress 5.7 – currently available as a beta release and...
Synopsys Cybersecurity Research Center (CyRC) researchers have discovered CVE-2020-27223, a denial of service vulnerability in Eclipse Jetty, a widely used open source web server and servlet container. According...
Positive Technologies security researcher Alexander Popov has discovered and fixed five similar issues in the virtual socket implementation of the Linux kernel. These vulnerabilities could be exploited...
2020 was a turning point for businesses across the globe as they were forced to accelerate their digital transformation processes and accommodate an unprecedented and rapid...
A legal demand has allegedly prevented a security conference speaker from holding a talk on Xerox printers. On February 18, a copy of a notice published...
UPDATED A Go package that relays system information to a Chinese IP address was one of several suspicious repositories uncovered during an investigation into typosquatting in the...