Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will...
Mitre releases its list of the most dangerous software weaknesses, detailing the most common vulnerabilities which can give cyber criminals the ability to access machines to...
WordPress is the world’s most popular content management system, powering around 40% of all websites globally. While the open source technology has helped millions of business owners, bloggers,...
Vulnerabilities in the way websites resolve email domains have left many sites open to DNS attacks that can lead to account hijacking, new research shows. In a study of 146...
Atlassian is prompting its enterprise customers to patch a critical vulnerability in many versions of its Jira Data Center and Jira Service Management Data Center products. The...
Antavo, a loyalty management software company, has launched a bug bounty program on European crowdsourced security platform Hacktify. Ethical hackers will receive payouts up to €240...
Developers have taken a second stab at fixing a tricky flaw in cURL, the command-line tool and library for transferring data with URLs. The utility, which...
A security researcher says he’s achieved remote code execution (RCE) on older, still downloadable versions of TIBCO Data Virtualization (TDV) software by chaining vulnerabilities in outdated...
A 16-year-old security vulnerability found in an HP, Xerox, and Samsung printers driver allows attackers to gain admin rights on systems using the vulnerable driver software....
Umbraco, a content management system (CMS) vendor, has given users of its form-building package a “heads-up” about an imminent software update addressing a remote code execution (RCE) vulnerability....
Recent Comments