Cyber Security
A proof-of-concept (PoC) has been developed for a critical vulnerability in F5’s BIG-IP networking software which could expose thousands of users to remote takeover....
Hi, what are you looking for?
A proof-of-concept (PoC) has been developed for a critical vulnerability in F5’s BIG-IP networking software which could expose thousands of users to remote takeover....
A zero-day vulnerability in uClibc and uClibc-ng, a popular C standard library, could enable a malicious actor to launch DNS poisoning attacks on vulnerable IoT devices....
The State Bar of Georgia in the US has suspended the normal operation of its website following “unauthorized access to its network”. The authorized access...
The Open Web Application Security Project (OWASP) has fixed a vulnerability in its Enterprise Security API (ESAPI) that, if left unresolved, might have been abused to run path traversal attacks....
A security vulnerability in a mobile device management software could allow attackers access to organizations’ internal and cloud networks, researchers warn. Discovered by Assetnote,...
IBM has updated data management platform Db2 in order to protect users from a pair of critical vulnerabilities in older versions of Expat, a...
The second edition of Pwn2Own Miami has thrown up dozens of previously undiscovered exploits to industrial control systems, earning security researchers pay-outs of $400,000 in...
Patches meant to protect containers Amazon Web Services (AWS) containers against the dangerous Log4Shell bug had critical vulnerabilities that could allow malicious containers to...
The US National Institute of Standards and Technology (NIST) has overhauled its enterprise patch management guidance for the first time in nearly a decade....
It’s time for developers to update their local Git installations following the discovery of a brace of vulnerabilities. The worst of the two flaws (CVE-2022-24765)...
Recent Comments