The bug in HPE SIM makes it easy as pie for attackers to remotely trigger code, no user interaction…
Read more >>Justin Jett, director of audit and compliance for Plixer, discusses the elements of a successful ad…
Read more >>Malicious ad campaign was able to rank higher in searches than legitimate AnyDesk ads. Via Vulnerab…
Read more >>David Wolpoff, CTO at Randori, argues that the call for rapid cloud transition Is a dangerous propo…
Read more >>Researchers found flaws most of the ‘popular’ PDF applications tested. Via Vulnerabilities – Threat…
Read more >>VMware’s virtualization management platform, vCenter Server, has a critical severity bug the compan…
Read more >>Threat hunters weigh in on how the business of ransomware, the complex relationships between cyberc…
Read more >>The security vendor's network management and threat protection station can open the door to cod…
Read more >>There are dozens of routes that Alaska Airways Flight 1405 can take from Oklahoma City to …
Read more >>Dale Ludwig, business development manager at Cherry Americas, discusses advances in hardware-based …
Read more >>One of the workaround XML files automatically deactivates protection from an earlier workaround: a …
Read more >>A WordPress reservation plugin has a vulnerability that allows unauthenticated hackers to access re…
Read more >>The plugin, installed on hundreds of thousands of sites, allows anyone to filch database info witho…
Read more >>On Wednesday, Google quietly slipped updates into its May 3 Android security bulletin for bugs that…
Read more >>Company is using threat of attacks as defense in case brought against it by Epic Games after Fortni…
Read more >>Work's being done with uber-lightweight nanoagents on every IoT device to stop malicious behavi…
Read more >>The newly discovered malware infects IoT devices in tandem with the prolific Gafgyt botnet, using k…
Read more >>The exploit pries open CVE-2021-31166, a bug with a CVSS score of 9.8 that was the baddest of the b…
Read more >>You can’t possibly patch all CVEs, so focus on the exploits crooks are willing to pay for, as track…
Read more >>The latest Magecart iteration is finding success with a new PHP web shell skimmer. Via Vulnerabilit…
Read more >>Pandemic and evolving IT demands are having a major, negative impact on CISOs' mental health, a…
Read more >>A flaw that allows browsers to enumerate applications on a machine threatens cross-browser anonymit…
Read more >>The DBRI – Verizon’s 2021 data breach report – shows spikes in sophisticated phishing, financially …
Read more >>Experts from Intel, GitHub and KnowBe4 weigh in on what you need to succeed at security bug-hunting…
Read more >>According to news reports, Colonial Pipeline paid the cybergang known as DarkSide the ransom it dem…
Read more >>An analysis of three popular forums used by ransomware operators reveals a complex ecosystem with m…
Read more >>The ‘Send My’ exploit can use Apple's locator service to collect and send information from near…
Read more >>Paper ballots and source-code transparency are recommended to improve election security. Via Vulner…
Read more >>Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're…
Read more >>Microsoft's May 2021 Patch Tuesday updates include fixes for four critical security vulnerabili…
Read more >>A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attac…
Read more >>The sophisticated threat is targeting Microsoft Exchange servers via ProxyLogon in a wave of fresh …
Read more >>(NEW YORK) — The cyberextortion attempt that has forced the shutdown of a vital U.S. pipel…
Read more >>U.S. intelligence said that the Chaos iPhone remote takeover exploit was used against the minority …
Read more >>A malicious app can exploit the issue, which could affect up to 30 percent of Android phones. Via V…
Read more >>The networking giant has rolled out patches for remote code-execution and command-injection securit…
Read more >>'Spam protection, AntiSpam, FireWall by CleanTalk' is installed on more than 100,000 sites …
Read more >>Remote code execution, privilege escalation to root and lateral movement through a victim's env…
Read more >>The security flaw tracked as CVE-2021-22893 is being used by at least two APTs likely linked to Chi…
Read more >>On Monday, Apple released a quartet of unscheduled updates for iOS, macOS, and watchOS, slapping se…
Read more >>The privilege-escalation bug remained hidden for 12 years and has been present in all Dell PCs, tab…
Read more >>The 3+ years computer scientists spent concocting ways to defend against these supply-chain attacks…
Read more >>Researchers warned that unpatched versions of HPE’s Edgeline Infrastructure Manager are open to rem…
Read more >>