Security researchers have found a flaw in the Microsoft Windows Platform Binary Table (WPBT) that could be exploited in easy attacks to install rootkits on all...
This week, threat actors hijacked Bitcoin.org, the authentic website of the Bitcoin project, and altered its parts to push a cryptocurrency giveaway scam that unfortunately some users fell for....
The rule would require cloud providers to verify the identities of certain users. The Commerce Department wants feedback on how it should shape rules for infrastructure-as-a-service...
Numerous vulnerabilities have been identified and fixed in Apache HTTP Server 2.4, including high-impact server-side request forgery (SSRF) and request smuggling bugs. The Apache HTTP Server Project is...
A new Chrome browser extension has been released to help bug bounty hunters find keys that have made their way into JavaScript online. The open source extension, now...
Cryptocurrency resource Bitcoin.org appears to be running normally again following a cyber-attack that commandeered the domain for a giveaway scam. The website was taken down in the...
Incident reporting provisions are being considered as part of the annual defense bill. Three of the nation’s top cybersecurity leaders asked lawmakers to use fines in...
Spanish authorities are warning of a phishing campaign that impersonates messaging service WhatsApp in an attempt to trick recipients into downloading a trojan. Recipients are being urged to...
Multiple Netgear routers contained a third-party vulnerability that could lead to remote code execution (RCE) via Manipulator-in-the-Middle (MitM) attacks, security researchers have revealed. Now patched, the...
Beego has patched a severe cross-site scripting (XSS) vulnerability that could lead to the compromise of a victim’s session or account. Beego is an open source framework designed for building...
Recent Comments