French IT monitoring company Centreon has downplayed reports of backdoor vulnerabilities in its open source software that were allegedly linked to Sandworm, a Russian hacking group. France’s National...
A security researcher has detailed how he was able to hack into systems belonging to Apple, Microsoft, PayPal, and other major tech companies in a novel...
Bleach, a Python library that enables web developers to clean HTML input and prevent cross-site scripting (XSS) attacks, was itself found to have an XSS vulnerability, according to...
Multiple vulnerabilities in open source video platforms YouPHPTube and AVideo could be leveraged to achieve remote code execution (RCE) on a user’s device. Researchers from Synacktiv discovered multiple vulnerabilities in the source...
The Nmap project has been wrongfully labeled as a cybersecurity “threat” by Google Chrome’s Safe Browsing service. The incident is the latest example of legitimate security tools becoming...
Attackers can bypass CoTURN servers’ default access control rules and access network services behind the firewall, security researchers have discovered. One researcher speculated that, under certain circumstances, an...
Bug bounty platform Intigriti has partnered with the European Commission to launch a new vulnerability rewards program for Matrix, the open source secure communication tool. Belgium-based...
A security researcher has detailed how a “critical” bug in the Spring Data project could be abused to expose and modify web application user data. The issue lies...
A new open source tool makes it easier to use Hashcat, the powerful password-cracking, command-line tool that uses the power of graphics cards to find the plaintext equivalent...
The software supply chain attack against IT infrastructure vendor SolarWinds last year has served to revive interest in technologies that might mitigate against this kind of...
Recent Comments