In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks...
WordPress has extended its Site Health interface for developers, allowing for greater visibility over potential security flaws. Version 5.8 of WordPress core, out today (July 20), allows...
A security researcher says he’s achieved remote code execution (RCE) on older, still downloadable versions of TIBCO Data Virtualization (TDV) software by chaining vulnerabilities in outdated...
US authorities have seized two domains supposedly selling unapproved drugs for the prevention or treatment of Covid-19 while falsely posing as sites run by Walmart. The...
Multiple vulnerabilities in routers from Aruba Networks allowed attackers to conduct a series of malicious activities including remote code execution (RCE), security researchers have found. Itai Greenhut and...
The United States, the European Union, NATO and other world powers on Monday accused the Chinese government of an array of malicious cybersecurity incidents, blaming its...
New evidence uncovered by Amnesty International and Forbidden Stories has revealed a massive wave of attacks by cyber surveillance company NSO Group’s customers on iPhones, potentially affecting thousands...
A hacker created a database of information scraped from 700 million LinkedIn users after tricking the company’s API and used the same technique to create a...
Dr. Bobby Blumofe, Chief Technology Officer of Akamai, discusses zero-trust security models and how they impact employee morale. Security: What is your background and current role?...
The Federal Bureau of Investigation (FBI) warns of threat actors potentially targeting the upcoming Olympic Games, although evidence of attacks planned against the Olympic Games Tokyo...
A 16-year-old security vulnerability found in an HP, Xerox, and Samsung printers driver allows attackers to gain admin rights on systems using the vulnerable driver software....
Recent Comments