The Pro-Ocean cryptojacking malware now comes with the ability to spread like a worm, as well as harboring new detection-evasion tactics. Researchers have identified an updated...
A new variant of the freshly minted NAT slipstreaming attack has emerged that could use unmanaged, internal network devices as a bridgehead to – in the...
A vulnerability in a Node.js web application framework could be exploited to achieve remote code execution (RCE). Made public by self-described “wannabe” security researcher Shoeb ‘CaptainFreak’ Patel on January 23, the research...
Windows 7 is still susceptible to blind TCP/IP hijacking attacks via a vulnerability that a security researcher says he reported to Microsoft eight years ago. Adam Zabrocki (AKA ‘pi3’)...
Fully-functional exploit code is now publicly available for a maximum severity pre-auth vulnerability impacting default configurations of an SAP Solution Manager (SolMan) component. SAP SolMan is an...
Drupal has released a security update to address a critical vulnerability in a third-party library with documented or deployed exploits available in the wild. “The Drupal...
Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic. Cybercriminals can exploit...
Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability in SAP’s enterprise software. The functional exploit goes...
A couple of researchers claim they have earned $50,000 from Apple for finding some serious vulnerabilities that gave them access to the tech giant’s servers. Harsh...
Google has published the first part of a six-part report, describing a sophisticated hacking operation that targeted owners of both Windows and Android devices. The tech...
Recent Comments