Northwave has conducted scientific research into the psychological fallout of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis...
A bug in Ember.js, a JavaScript framework for building Node.js web applications, allowed attackers to stage prototype pollution attacks against the host server. Prototype pollution attacks...
ANALYSIS Advances in technology over the last decade have enabled academics to make progress in creating so-called one-time programs. One-time programs (OTPs) – originally presented at the...
Malicious proof-of-concepts (PoCs) are potentially exposing GitHub users to malware and other malfeasance, researchers have found. In a paper titled ‘How security professionals are being attacked: A study...
Security researchers have discovered a serious vulnerability in HyperSQL DataBase (HSQLDB) that poses a remote code execution (RCE) risk. HSQLDB offers a Java-based SQL relational database...
PhishLabs by HelpSystems has identified attackers leveraging a weakness in Google’s ad service to carry out phishing campaigns on financial institutions. In this Help Net Security video, Kevin...
Windows servers running Microsoft Office Online Server can be exploited to achieve server-side request forgery (SSRF) and thereafter remote code execution (RCE) on the host, according...
Forescout’s research team analyzed 19 million connected devices deployed across five different industries, to find the riskiest device groups: smart buildings, medical devices, networking equipment, and...
Public disclosure, a talk, and a blog post later, the RCE exploit remains unresolved Despite a researcher’s best efforts at disclosure, the maintainers of the WebPageTest...
Matrix has patched five serious vulnerabilities in its end-to-end encryption that break the confidentiality and authentication of messages. The flaws would allow a malicious server to read user...
Recent Comments