Researchers plan to introduce a revamp of PunkSpider, which helps identify flaws in websites so com…
Read more >>Researchers preview work to be presented at Black Hat on how AD “misconfiguration debt” lays out a …
Read more >>Two bugs, now patched except in older versions, could be chained to allow attackers to hijack Zimbr…
Read more >>The unpatched flaws include RCE and authenticated privilege escalation on the client-side: Just the…
Read more >>Company urges iPhone, iPad and Mac users to install updates to fix a critical memory corruption fla…
Read more >>Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems…
Read more >>Microsoft releases mitigations for a Windows NT LAN Manager exploit that forces remote Windows syst…
Read more >>Sprechen Sie Rust? Polyglot malware authors are increasingly using obscure programming languages to…
Read more >>On Tuesday, the Catholic Substack newsletter The Pillar published an investigation into…
Read more >>The software-engineering platform is urging users to patch the critical flaw ASAP. Via Vulnerabilit…
Read more >>Critical ICS vulnerabilities can be exploited through leading cloud-management platforms. Via Vulne…
Read more >>Update now: The ream of bugs includes some remotely exploitable code execution flaws. Still to come…
Read more >>A privilege elevation bug in Windows 10 opens all systems to attackers to access data and create ne…
Read more >>Researchers are skeptical that much will come from calling out China for the Microsoft Exchange att…
Read more >>Misconfigured permissions for Argo's web-facing dashboard allow unauthenticated attackers to ru…
Read more >>Our roundtable of experts weighs in on implications for Apple and lawmakers in the wake of the bomb…
Read more >>On Sunday, an international collaboration between The Washington Post, The Guardian and …
Read more >>The bug could allow cyberattackers to bypass security products, tamper with data and run code in ke…
Read more >>A format-string bug believed to be a low-risk denial-of-service issue turns out to be much nastier …
Read more >>An analysis of criminal forums reveal what publicly known vulnerabilities attackers are most intere…
Read more >>Curtis Simpson, CISO at Armis, discusses the stop qualities that all CISOs need to possess to excel…
Read more >>Telecom providers, including wireless carriers, are at risk of disruption of network service if the…
Read more >>Candiru, aka Sourgum, allegedly sells the DevilsTongue surveillance malware to governments around t…
Read more >>Another vulnerability separate from PrintNightmare allows for local elevation of privilege and syst…
Read more >>The popular e-commerce platform for WordPress has started deploying emergency patches. Via Vulnerab…
Read more >>SonicWall issued an urgent security alert warning customers that some of its current and legacy fir…
Read more >>Researchers shed light on how attackers exploited Apple web browser vulnerabilities to target gover…
Read more >>Phil Richards, vice president and CSO at Ivanti, explains how organizations can design DevOps proce…
Read more >>As the threat of ransomware grows, companies have felt pressed to pay massive amounts to h…
Read more >>A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-re…
Read more >>Microsoft tackles 12 critical bugs, part of its July 2021 Patch Tuesday roundup, capping a ‘PrintNi…
Read more >>The 'ModiPwn' bug lays open production lines, sensors, conveyor belts, elevators, HVACs and…
Read more >>Adobe July patch roundup includes fixes for its ubiquitous and free PDF reader Acrobat 2020 and oth…
Read more >>Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the rans…
Read more >>Microsoft alerted the company to a security vulnerability in its Serv-U Managed File Transfer and S…
Read more >>The bugs allow a range of attacks on websites, including deleting blog pages and remote code execut…
Read more >>The attacks are enabled by an unpatched security vulnerability in ForgeRock's Access Management…
Read more >>The security update addresses three VSA vulnerabilities used by the ransomware gang to launch a wor…
Read more >>Word and Excel documents are enlisted to disable Office macro warnings, so the Zloader banking malw…
Read more >>The high-severity security vulnerabilities allow elevation of privileges, leading to data theft and…
Read more >>The problem APIs included numero uno on the OWASP API Security Top 10: a Broken Object Level Author…
Read more >>Security vulnerabilities in the ERP platform could allow attackers to tamper with or sabotage victi…
Read more >>Threat actors enlist compromised WordPress websites in campaign targeting macOS users. Via Vulnerab…
Read more >>David "moose" Wolpoff, CTO at Randori, discusses security appliances and VPNs and how att…
Read more >>The fix doesn’t cover the entire problem nor all affected systems however, so the company also is o…
Read more >>Say hello to one more zero-day and yet more potential remote data death for those who can’t/won’t u…
Read more >>REvil ransomware gang lowers price for universal decryptor after massive worldwide ransomware push …
Read more >>Following a brazen ransomware attack by the REvil cybergang, CISA and FBI offer guidance to victims…
Read more >>The ongoing attacks are targeting cloud services such as Office 365 to steal passwords and password…
Read more >>Nate Warfield, CTO of Prevailion and former Microsoft security researcher, discusses the many secur…
Read more >>CERT urges administrators to disable the Windows Print spooler service in Domain Controllers and sy…
Read more >>Microsoft researchers discovered the firmware flaws in the DGN-2200v1 series router that can enable…
Read more >>The self-propagating malware's attack chain is complex, using former NSA cyberweapons, and ulti…
Read more >>