Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from...
Three recently unearthed vulnerabilities in the Linux kernel, located in the iSCSI module used for accessing shared data storage facilities, could allow root privileges to anyone...
UPDATED A newly launched regex-scanning tool has been used by its architects to unearth multiple regular expression denial-of-service (ReDoS) vulnerabilities in popular NPM, Python, and Ruby dependencies....
Google has fixed a second actively exploited Chrome zero-day this month with the release of Chrome 89.0.4389.90 to the Stable desktop channel for Windows, Mac, and Linux users. “Google is aware...
Today, researchers have exposed common weaknesses lurking in the latest smart sex toys that can be exploited by attackers. As more as more adult toy brands enter...
The most serious of a raft of security vulnerabilities found in two Netgear ProSAFE Plus networking switches could lead to unauthenticated remote code execution (RCE) on affected devices....
Bitcoin exchange Sovryn has launched what is believed to be the biggest bug bounty reward to date, offering $1.25 million for the disclosure of security vulnerabilities in its...
Nine security updates released by enterprise software giant SAP on Tuesday (March 9) include fixes for two newly discovered and critical vulnerabilities. A critical code injection vulnerability in...
The Git Project has patched a vulnerability that could result in remote code execution. The bug – tracked as CVE-2021-21300 – is present in several versions of the open source code...
GitHub users were forcibly signed out of their accounts yesterday (March 8) to protect against a security bug that could have exposed a user’s session cookies....
Recent Comments