A peculiarity of Japanese punctuation appears to have heightened the impact of a Chrome and Firefox vulnerability whose resolution has been complicated by the potential impact on enterprise...
Members of the House of Representatives recently voted to pass the Department of Homeland Security (DHS) Software Supply Chain Risk Management Act of 2021 (H.R. 4611),...
A security hole in the file-sharing feature of Slack enables malicious actors to identify users outside of the workforce messaging platform. Slack apparently has no plans...
The maintainers of Node.js have patched two HTTP request smuggling (HRS) vulnerabilities in the JavaScript runtime environment, including one found using what appears to be a new HRS...
Microsoft has asked system administrators to patch PowerShell 7 against two vulnerabilities allowing attackers to bypass Windows Defender Application Control (WDAC) enforcements and gain access to...
Networking and cybersecurity solutions provider Juniper Networks this week released more than 40 security advisories to describe over 70 vulnerabilities that affect the company’s products. Roughly...
Vulnerabilities in a popular WordPress plugin Fastest Cache could allow an attacker to gain access to credentials and takeover an admin account. The security flaws in the extension,...
A security loophole in GitHub Actions allows software code to be automatically passed without any peer or supervisor review. The vulnerability, discovered by security researcher Omer Gil...
Three vulnerabilities have been addressed in Nagios XI, which monitors mission-critical enterprise infrastructure components. Nagios XI monitors applications, services, operating systems, network protocols, systems metrics, and network infrastructure,...
Mobile phone manufacturer ZTE has announced it has launched a public bug bounty program offering up to €2,000 ($2,300) for security vulnerabilities. The program, launched in partnership with...
Recent Comments