The release of a more nimble, effective, and versatile version of the Zeoticus ransomware has underlined the growing importance of attack prevention, a security researcher has...
Security researchers at Trustwave have discovered three new severe security vulnerabilities in the SolarWinds IT monitoring and management platform. The findings – detailed in a technical blog...
The vast majority of the most popular Windows-native PDF viewers were vulnerable to multiple attack techniques exploiting standard PDF features, a team of security researchers has discovered. Several...
It’s rare for the top-level domains of countries to fall into the hands of individuals, but in some cases it is the only way to stop...
Security researchers have earned a $50,000 bug bounty after uncovering a critical flaw in Apple’s travel portal. Rahul Maini and Harsh Jaiswal were able to achieve remote code execution (RCE)...
UPDATED Security vulnerabilities and other software shortcomings cost the US economy more than $2 trillion in 2020, according to a new report. Operational software failures were by...
Threat actors such as the notorious Lazarus group are continuing to tap into the ongoing COVID-19 vaccine research to steal sensitive information to speed up their...
A raft of pre-authenticated vulnerabilities in the aged but widely used Treck TCP/IP stack can lead to both denial-of-service (DoS) and remote code execution (RCE) on target systems....
Attackers can compromise computers that have no internet connectivity and steal their data through memory operations and WiFi receivers, a security researcher at Ben-Gurion University of...
A security researcher has chained multiple vulnerabilities in Trend Micro’s InterScan Web Security Virtual Appliance (IWSVA) to seize control of the web gateway security product. Sysadmins...
Recent Comments