Cyber Security
Tighter controls have been introduced to resolve a weakness in GitHub Actions that made it possible to circumvent code review safeguards. Omer Gil and...
Hi, what are you looking for?
Tighter controls have been introduced to resolve a weakness in GitHub Actions that made it possible to circumvent code review safeguards. Omer Gil and...
Vulnerabilities in CMS platform Umbraco could allow an attacker to takeover a user’s account, researchers warn. Umbraco is a free and popular open source content management...
A critical ‘zero-day’ vulnerability in network video recording equipment made by NUUO has been made public, as a researcher claims unpatched issues could lead...
A critical vulnerability in the Windows HTTP Protocol Stack presents a remote code execution (RCE) risk and could be “wormable”, Microsoft warns. The vulnerability...
The developers behind Node.js have released new versions of several release lines to address four vulnerabilities in the server-side technology. Node.js is a popular JavaScript runtime...
Experimentation with ANSI escape characters on terminal emulators has led to the discovery of multiple high-severity DoS (denial of service) vulnerabilities on Windows terminals...
Web skimming attacks are targeting hundreds of real estate websites via a cloud-based video hosting service, researchers have warned. A blog post from Unit 42, the...
A vulnerability in Uber’s email system allows just about anyone to send emails on behalf of Uber. The researcher who discovered this flaw warns...
A subdomain takeover vulnerability in a popular WordPress hosting platform could allow an attacker to deploy malicious code to a victim by impersonating a...
All set for the weekend? Not so fast. Yesterday, BleepingComputer summed up all the log4j and logback CVEs known thus far. Ever since the critical log4j zero-day...
Recent Comments