Cyber Security
A pair of vulnerabilities in the web control panel of IT monitoring system Icinga created a route for even unauthenticated attackers to run arbitrary PHP code...
Hi, what are you looking for?
A pair of vulnerabilities in the web control panel of IT monitoring system Icinga created a route for even unauthenticated attackers to run arbitrary PHP code...
The REvil ransomware has a vulnerability that can be exploited to deactivate the malware before it encrypts files on an infected computer, a security...
A zero-day vulnerability in uClibc and uClibc-ng, a popular C standard library, could enable a malicious actor to launch DNS poisoning attacks on vulnerable IoT devices....
Doubts have arisen about the veracity of research that purportedly demonstrates a serious vulnerability involving VirusTotal, a Google-owned antivirus comparison and threat intel service. VirusTotal (VT) offers...
A new report released today reveals that UK government employees receive an average of 2,400 malicious emails per year, as cybercriminals continue to use...
Deepfence has launched new open source tool PacketStreamer that captures network traffic from multiple sources to reveal potential hacking behaviors. PacketStreamer sensors collect raw network...
A security researcher claims they netted $36,000 in bug bounties after uncovering critical HTTP request smuggling vulnerabilities affecting three of Apple’s core web applications. The...
A “crazy” parser bug potentially leading to XSS exploits has been patched by Chromium developers. The vulnerability was reported in July 2021 to Chromium...
Attackers are exploiting security vulnerabilities more quickly, often within a week of their public disclosure, according to a study by Rapid7. The latest edition of Rapid7’s...
Security researchers have uncovered a stored cross-site scripting (XSS) vulnerability in Microweber, an open source website builder and content management system (CMS). The security issue, discovered...