Security researchers have uncovered three vulnerabilities in fitness and gym management application Wodify that could allow an authenticated user to modify production data and extract sensitive personal information....
A vulnerability in Node.js that could allow a remote actor to perform domain hijacking attacks has been fixed. The maintainers of the JavaScript runtime environment have released a security...
The European Union has forecast there will be four times more software supply chain attacks in 2021 than there were in 2020, as cybercriminals shift to larger, cross-border...
A number of British universities have been awarded a grant to explore the security issues surrounding Internet of Things (IoT) and smart home devices, as well as to...
The financial cost of a data breach is at its highest ever, due in part to the coronavirus pandemic and organizations taking significantly longer to resolve incidents. IBM...
Zimbra, an open source webmail platform used by more than 200,000 enterprises, contained a pair of vulnerabilities that, if combined, allowed unauthenticated attackers to gain control...
The report notes that other security teams have discovered large-scale cryptocurrency mining attacks against Kubernetes clusters. Analysts with cybersecurity company Intezer have found that cybercriminals are...
Vulnerabilities in the way websites resolve email domains have left many sites open to DNS attacks that can lead to account hijacking, new research shows. In a study of 146...
More than a third of infosec professionals have experienced harassment from their peers, according to a study by a new initiative aiming at tackling the problem....
Multiple vulnerabilities in routers from Aruba Networks allowed attackers to conduct a series of malicious activities including remote code execution (RCE), security researchers have found. Itai Greenhut and...
Recent Comments