Security researchers claim to have uncovered serious security shortcomings in the systems of identity provider Okta. Identity and access management specialist Authomize went public with four supposed...
A new release of Tor Browser enables users to circumvent location-specific censorship to connect to the anonymous web browser more easily. Introduced in version 11.5, Connection...
An unauthenticated arbitrary object instantiation vulnerability in LDAP Account Manager (LAM) has been discovered during an internal penetration test. LAM is a PHP web application for...
The office will inform other efforts to come as the agency grows its international presence. The Cybersecurity and Infrastructure Security Agency is opening an office in...
The ‘Log4Shell’ vulnerability in open source library Log4j has reached “endemic” proportions and the aftershock could reverberate for “a decade or longer”, according to a landmark US government...
Blitz.js, a JavaScript web application framework, has patched a dangerous prototype pollution vulnerability that could lead to remote code execution (RCE) on Node.js servers. Prototype pollution is a...
A court in Moscow has imposed a fine of $358 million (21 billion rubles) on Google LLC for failing to restrict access to information considered prohibited...
After hitting Germany, Taiwan, South Korea, Japan, the US, and the U.K. the Roaming Mantis operation moved to targeting Android and iOS users in France, likely...
The Matrix open network for decentralized communication has announced a record growth of 79% in the past 12 months, now counting more than 60 million users....
Researchers following the activities of advanced persistent (APT) threat groups originating from China, North Korea, Iran, and Turkey say that journalists and media organizations have remained a...
Recent Comments