Cyber Security
Zyxel has released patches for several of its firewall products following the discovery of two security vulnerabilities that left business networks open to exploitation....
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Zyxel has released patches for several of its firewall products following the discovery of two security vulnerabilities that left business networks open to exploitation....
Atlassian has addressed a hardcoded credential flaw in Questions for Confluence and servlet filter bypasses in multiple other products. The Australian vendor of software development and...
A researcher at security firm Cyllective has unearthed vulnerabilities in dozens of WordPress plugins, affecting tens of thousands of installations. Dave Miller, who leads...
A raft of zero-day flaws found in a popular automotive GPS tracking device “could have disastrous and even life-threatening implications”, security researchers warn. Six as-yet-unpatched vulnerabilities...
Decentralized Identifiers (DID) is now an official web standard, according to a news release from the World Wide Web Consortium (W3C). DIDs are cryptographic digital identifiers...
Security researchers claim to have uncovered serious security shortcomings in the systems of identity provider Okta. Identity and access management specialist Authomize went public...
A new release of Tor Browser enables users to circumvent location-specific censorship to connect to the anonymous web browser more easily. Introduced in version...
The ‘Log4Shell’ vulnerability in open source library Log4j has reached “endemic” proportions and the aftershock could reverberate for “a decade or longer”, according to a landmark...
Blitz.js, a JavaScript web application framework, has patched a dangerous prototype pollution vulnerability that could lead to remote code execution (RCE) on Node.js servers. Prototype pollution...
The Matrix open network for decentralized communication has announced a record growth of 79% in the past 12 months, now counting more than 60...
Recent Comments