A hugely popular GDPR compliance plugin for WordPress contained an authenticated, persistent cross-site scripting (XSS) vulnerability related to the insecure use of PHP’s extract() function, according to security researchers. As...
Security researchers are compiling an easy-to-follow list of vulnerabilities ransomware gangs and their affiliates are using as initial access to breach victims’ networks. All this started...
After pledging $100 million towards improving open source security last month, Google is sponsoring security reviews of eight projects through a partnership with the Open Source Technology Improvement...
Manufacturers are risking devastating data breaches by giving employees too much access to sensitive files, a new report has warned. The study from Varonis, which was published yesterday...
A new botnet malware is spreading across the internet – and according to new research, it might have already infected 200,000 devices. Called Meris, the botnet...
Security researchers have disclosed a HTTP request smuggling vulnerability in HAProxy, the popular open source load balancer. Users of HAProxy, which ships with most mainstream Linux distributions...
A mobile app developed by New York State to store records of Covid-19 vaccinations was vulnerable to credential forgery, security researchers at NCC Group have discovered. The New...
Machine learning models trained on the visual representation of website code can help improve the accuracy and speed of detecting phishing websites. This is according to a paper (PDF) by...
Several zero-day vulnerabilities in a home baby monitor could be exploited to allow hackers access to the camera feed and plant unauthorized code such as malware. The security...
A new type of distributed denial-of-service (DDoS) attack could allow nation-state actors to censor internet access and target any website by abusing middleboxes. A team from...
Recent Comments