UPDATED Security researchers have gone public about a set of five vulnerabilities in telecoms stack software FreeSwitch. The quintet of flaws – all discovered by a team from German...
Online scams are still the biggest cyber threat to African citizens, a new report has revealed, though ransomware attacks are “expanding rapidly” across the continent. The study (PDF), published by...
A security hole in the file-sharing feature of Slack enables malicious actors to identify users outside of the workforce messaging platform. Slack apparently has no plans...
Researchers find that lax ICS security is putting critical services at risk of exploitation. The “abysmal” state of security for industrial control systems (ICSs) is putting...
Researchers have disclosed the details of new timing and power-based side-channel attacks that affect all CPUs made by AMD, but the chipmaker says no new mitigations...
Vulnerabilities in a popular WordPress plugin Fastest Cache could allow an attacker to gain access to credentials and takeover an admin account. The security flaws in the extension,...
We have recently noticed another Linux threat evolution that targets relatively new cloud service providers (CSPs) with cryptocurrency-mining malware and cryptojacking attacks. In this article, we discuss a new Linux malware trend in...
The maintainers of Apache Ranger have criticized a report that benchmarks the open source data governance platform against proprietary rival Immuta in terms of implementing access...
More than 1,000 popular websites and 18 widely used JavaScript libraries are vulnerable to prototype pollution, an obscure attack technique that targets the structure of JavaScript objects,...
Organizations are urged to be more proactive when it comes to protecting against vulnerabilities, after a report found that malicious attackers routinely exploit unpatched systems. The 2021 Trustwave...
Recent Comments