Cyber Security
Attackers are exploiting security vulnerabilities more quickly, often within a week of their public disclosure, according to a study by Rapid7. The latest edition of Rapid7’s...
Hi, what are you looking for?
Attackers are exploiting security vulnerabilities more quickly, often within a week of their public disclosure, according to a study by Rapid7. The latest edition of Rapid7’s...
A popular software library for rendering PDFs from HTML documents suffers from an unpatched vulnerability that poses a remote code execution (RCE) risk, security researchers claim....
Enterprise software firm Solarwinds has fixed a critical bug in its Web Help Desk software that allowed attackers to execute arbitrary Hibernate Query Language...
A critical vulnerability in the Windows HTTP Protocol Stack presents a remote code execution (RCE) risk and could be “wormable”, Microsoft warns. The vulnerability...
A 19-year-old hacker from Nepal has received a $4,500 bug bounty following their discovery of an easy-to-exploit vulnerability that allowed users to reveal the...
Security flaws in chipsets used by more than 65 IoT device manufacturers have been identified by researchers. The vulnerabilities affect WiFi-enabled devices using a software development...
Italian web hosting firm Aruba.it has admitted a recent data breach amid complaints from some customers that it was slow in notifying them about a problem....
The Twitter hashtag #cisotips has been greeted by derision from the hacker community after a spoof tweet mocking bad infosec advice went viral. It came after...
Up to a third of all security flaws reported to organizations with no vulnerability disclosure policy (VDP) are not being patched due to failings in the...
Users of the Pega Infinity enterprise software platform are being advised to update their installations after a vulnerability was discovered by security researchers. According...
Recent Comments