The RCE bug affects versions below 4.4 of the Slack desktop app. Via Vulnerabilities – Threatpost h…
Read more >>Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public…
Read more >>Nine bugs were patched, eight of which are rated ‘high’ severity. Via Vulnerabilities – Threatpost …
Read more >>The popular Autodesk software was exploited in a recent cyberespionage campaign against an internat…
Read more >>IT teams have had to learn to be dynamic as workforces continue to shift strategies while COVID-19 …
Read more >>Researchers have unearthed more vulnerabilities in Microsoft’s IoT security solution. Via Vulnerabi…
Read more >>Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attack…
Read more >>The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cry…
Read more >>With many in the public sphere warning about a potential compromise of the integrity of the Preside…
Read more >>The high-severity flaw, which was patched in the latest version of Google's Chrome browser, cou…
Read more >>Like so many of us, Massimo Rapparini, chief information officer at Logitech, had no choic…
Read more >>APIs make your systems easier to run -- and make it easier for hackers, too. Via Vulnerabilities – …
Read more >>The group has added a management console and a USB worming function to its main malware, Crimson RA…
Read more >>The unscheduled security update addresses two "important"-severity flaws in Windows 8.1 a…
Read more >>Cisco has issued a fix for a critical flaw in its Virtual Wide Area Application Services (vWAAS), s…
Read more >>A low-privileged process on a vulnerable machine could allow data harvesting and DoS. Via Vulnerabi…
Read more >>Join Threatpost on Sept. 16 at 2pm ET when we bring together leading voices in the Bug Bounty commu…
Read more >>Up to 61 percent out of the IATA (International Air Transport Association) airline members do not h…
Read more >>Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs …
Read more >>Researchers have discovered freely available PoC code and exploit that can be used to attack unpatc…
Read more >>The XCSSET suite of malware also hijacks browsers, has a ransomware module and more -- and uses a p…
Read more >>The cross-site scripting flaw could enable arbitrary code execution, information disclosure - and e…
Read more >>Researchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and …
Read more >>Citrix said that it anticipates malicious actors "will move quickly to exploit" two criti…
Read more >>One of the two zero-day bugs is rated ‘critical’ and is classified as a remote code-execution bug i…
Read more >>A critical privilege-escalation flaw affects several popular Intel motherboards, server systems and…
Read more >>As the coronavirus pandemic deepened and students across the U.S. were forced to learn fro…
Read more >>Adobe patched critical and important-severity flaws tied to 26 CVEs in Acrobat and Reader. Via Vuln…
Read more >>Four critical-severity flaws were recently disclosed in the Find My Mobile feature of Samsung Galax…
Read more >>Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year t…
Read more >>The vulnerability allows attackers to bypass Content Security Policy (CSP) protections and steal da…
Read more >>Remote, unauthenticated attackers could exploit the TeamViewer flaw to execute code and crack victi…
Read more >>Researchers identified serious flaws in Qualcomm’s Snapdragon SoC and the Hexagon architecture that…
Read more >>Legacy applications don't support modern authentication -- and cybercriminals know this. Via Vu…
Read more >>An inside look at how nation-states use social media to influence, confuse and divide -- and why cy…
Read more >>Researchers went into detail about the discovery and disclosure of 19 security flaws they found in …
Read more >>Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers …
Read more >>Voting machine technology seller Election Systems & Software (ES&S) offered an olive branch…
Read more >>A vulnerability in Twitter for Android could have allowed attackers to access private direct messag…
Read more >>Voting Village security celeb Matt Blaze delves into the logistics of scaling up mail-in voting ahe…
Read more >>Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android secur…
Read more >>An attacker can hide amidst legitimate traffic in the application's update function. Via Vulner…
Read more >>An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of tho…
Read more >>Almost two months after a high-severity flaw was disclosed - and seven months after it was first re…
Read more >>The flaws have been confirmed by Grandstream, but no firmware update has yet been issued. Via Vulne…
Read more >>Three have been charged in alleged connection with the recent high-profile Twitter hack - including…
Read more >>