Cyber Security
A new vulnerability has been found that could allow an attacker to gain unauthorized access to cloud-based Golang applications. The use of unsafe URL parsing...
Hi, what are you looking for?
A new vulnerability has been found that could allow an attacker to gain unauthorized access to cloud-based Golang applications. The use of unsafe URL parsing...
Switzerland’s National Cyber Security Centre (NCSC) has announced it is launching a new bug bounty program for the federal government. A pilot project conducted...
Open source DevOps platform Jenkins is warning users of unpatched security vulnerabilities impacting more than a dozen plugins. A leading open source automation server, Jenkins provides...
Researchers have released details on a trio of cross-site scripting (XSS) vulnerabilities in popular open source apps that could lead to remote code execution (RCE). The...
One of the primary methods used by malware distributors to infect devices is by deceiving people into downloading and running malicious files, and to...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’...
A security vulnerability in file transfer software CompleteFTP allowed unauthenticated attackers to delete arbitrary files on affected installations. Developed by EnterpriseDT of Australia, CompleteFTP is a...
An Australian man was charged for developing and selling the Imminent Monitor remote access trojan, used to spy on victims’ devices remotely. A remote...
Researchers have uncovered a gigantic network of more than 11,000 domains used to promote numerous fake investment schemes to users in Europe. The platforms show...
Several adware apps promoted aggressively on Facebook as system cleaners and optimizers for Android devices are counting millions of installations on Google Play store. The...