Meet Ali Golshan, CTO and co-founder at StackRox, a Mountain View, Calif.-based leader in security for containers and Kubernetes. Prior to StackRox, he was the Founder & CTO...
A raft of pre-authenticated vulnerabilities in the aged but widely used Treck TCP/IP stack can lead to both denial-of-service (DoS) and remote code execution (RCE) on target systems....
The discovery of a critical digital certificate handling vulnerability by technology bundled with the Nintendo 3DS handheld gaming console has earned a researcher a $12,168 bug bounty....
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business technology platform...
Telangana state government took over three months to protect sensitive details of its employees and pensioners from its website. The Indian Computer Emergency Response Team (CERT-In)...
Attackers can bypass password checks in applications that use Bouncy Castle’s OpenBSDBcrypt class because of recently discovered cryptographic mistakes in the widely used encryption library. The authentication bypass vulnerability (CVE-2020-28052) was discovered...
Security researchers from Trustwave have lifted the lid on a raft of recently revealed security vulnerabilities in routers from D-Link. Five vulnerabilities in the DSL-2888A router, a higher end,...
A security researcher has chained multiple vulnerabilities in Trend Micro’s InterScan Web Security Virtual Appliance (IWSVA) to seize control of the web gateway security product. Sysadmins...
Security vulnerabilities in the direct file transfer applications of popular smartphone makers allow attackers to send malicious files to mobile devices, a security researcher has found. In a...
UPDATED Network security appliance firm F5 has warned of a series of vulnerabilities affecting its BIG-IP products, including a cross-site scripting (XSS) vulnerability that’s said to pose a critical...
Recent Comments