The rapid shift to a work-from-home model caused by the Covid-19 pandemic has ramped up penetration testing in enterprise environments, but questions remain over whether or not current...
Maliciously constructed Wireshark packet capture files might be used to distribute malware, providing recipients can be tricked into double clicking file URL fields. Variants of the same attack could...
A platform for sharing and requesting indicators of compromise (IoCs) associated with different malware strains is the latest open source intelligence (OSINT) service launched by Abuse.ch....
Two in three UK-based organizations are likely to increase their cybersecurity spending in 2021 despite the unprecedented financial toll exacted by Covid-19, according to a survey of...
A total of five vulnerabilities that could lead to local privilege escalation were recently identified and fixed in the Linux kernel. Identified by Positive Technologies security...
Multiple vulnerabilities including a remote code execution (RCE) flaw in Micro Focus Operations Bridge Reporter have been patched. Operations Bridge Reporter (OBR) is an enterprise-grade product based on...
ModSecurity 3 web application firewall (WAF) installations configured to disable Request Body Access can be bypassed, security researchers warn. The purported issue in ModSecurity rule sets is...
VMware has patched a critical remote code execution (RCE) vulnerability in its vCenter server management software that could allow hackers to take over servers and gain access to...
Canadian airplane maker Bombardier announced that it suffered a breach that exposed employee, customer, and supplier data. Headquartered in Montréal, Canada, Bombardier is present in more than 12...
Security researchers at Detectify have discovered a series of middleware misconfigurations in Nginx that could leave web applications vulnerable to attack. Lightweight, modular, open source, and with...
Recent Comments