Trend Micro technology designed to protect home networks from attack was itself beset by multiple security flaws. The three vulnerabilities in Trend Micro’s Home Network Security Station, all discovered by...
Attackers were able to impersonate legitimate devices during the Bluetooth pairing process because of inherent security weaknesses in the Bluetooth Core and Bluetooth Mesh specifications that...
UPDATED Security researchers have detailed how a series of moderate severity vulnerabilities in IT monitoring technology Nagios could be chained together to attack organizations on a grand scale. Researchers...
The plugin, installed on hundreds of thousands of sites, allows anyone to filch database info without having to be logged in. WP Statistics, a plugin installed...
A wormable vulnerability in the HTTP Protocol Stack of the Windows IIS server can also be used to attack unpatched Windows 10 and Server systems publicly...
An attack chain of bugs leading to remote code execution (RCE) on QNAP NAS devices has been resolved in QNAP’s MusicStation and Malware Remover software. QNAP’s Music Station...
Two newly patched bugs in Rocket.Chat made it possible for attackers to mount a series of attacks that ultimately led to remote code execution (RCE) on host servers....
Opera has publicly disclosed six serious vulnerabilities that were discovered in a security audit of Privoxy, the open source web proxy software. Opera, the developer of a Chromium-based...
Every hour, a threat actor starts a new scan on the public web for vulnerable systems, moving at a quicker pace than global enterprises when trying...
Novel credit card skimming malware that easily evades client-side detection has been deployed against e-commerce sites running unsupported versions of Magento, security researchers have found. The campaign has...
Recent Comments