UPDATED Android app developers have been urged not to load code dynamically because of the heightened risk of code execution vulnerabilities. Security researchers issued the warning after disclosing details...
The Chromium team has patched a 2.5-year-old bug that made it possible to stage cross-site scripting (XSS) attacks on web pages, even if they had been configured to...
Security researcher Ian Carroll has explained how he was able to exploit outdated Apache Airflow instances to find a series of vulnerabilities and collect more $13,000...
Security researchers have revealed the details of two vulnerabilities in Joomla – the popular content management system – which, if chained together, could be used to achieve full...
GitHub has updated its policy on malware and exploit research to make the platform more accommodating to vulnerability hunters. The policy changes mean that dual-use security research and collaboration...
Google has announced a new experimental Abuse Research Grants Program for abuse-related tactics and product issues outside the scope of existing Vulnerability Research Grants and the...
Cybersecurity researchers have disclosed two new attack techniques on certified PDF documents that could potentially enable an attacker to alter a document’s visible content by displaying...
Cybersecurity researchers have disclosed a new backdoor program capable of stealing user login credentials, device information and executing arbitrary commands on Linux systems. The malware dropper...
Security researchers have traced an argument injection vulnerability in content management systems (CMS) to flaws in Ruby Gem Dragonfly, an image handling library. New Zealand security consultancy ZX Security...
UPDATED Security researchers have detailed how a series of moderate severity vulnerabilities in IT monitoring technology Nagios could be chained together to attack organizations on a grand scale. Researchers...
Recent Comments