Last night, GitHub automatically logged out many users by invalidating their GitHub.com sessions to protect user accounts against a potentially serious security vulnerability. Earlier this month GitHub had received a report of anomalous behavior...
Besides 10 organisations in the Indian power sector and two ports, Chinese state-sponsored hackers might also have targeted Indian Railways infrastructure, an expert with cyber intelligence...
This week Samsung has started rolling out Android’s March security updates to mobile devices to patch critical security vulnerabilities in the runtime, operating system, and related components....
Multiple vulnerabilities including a remote code execution (RCE) flaw in Micro Focus Operations Bridge Reporter have been patched. Operations Bridge Reporter (OBR) is an enterprise-grade product based on...
A team of researchers has developed a new open-source tool that can help automate the discovery of dangerous deserialization vulnerabilities in .Net applications. Named SerialDetector, the...
A security vulnerability has been discovered in CIRA’s Canadian Shield iOS application – an app designed to protect Canadian users from malware and phishing. Canadian Shield, created by...
ModSecurity 3 web application firewall (WAF) installations configured to disable Request Body Access can be bypassed, security researchers warn. The purported issue in ModSecurity rule sets is...
Vulnerabilities in the Smarty PHP template engine could be exploited to achieve remote code execution (RCE) in third-party applications, a security researcher has warned. Two separate sandbox...
Cybersecurity firm Qualys is likely the latest victim to have suffered a data breach after a zero-day vulnerability in their Accellion FTA server was exploited to steal...
Supposedly benign behaviors exhibited by JSON parsers can introduce a variety of security risks arising from how data is interpreted across multiple parsers, security researchers have found. Of...
Recent Comments