Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.
Lucian Constantin |
21 Apr |
Read more
Oracle released a record 299 security fixes for vulnerabilities in its products, including patches for a widely exploited vulnerability in the Apache Struts framework and a Solaris exploit supposedly used by the U.S. National Security Agency.
Lucian Constantin |
19 Apr |
Read more
An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.
Lucian Constantin |
14 Apr |
Read more
Microsoft released its monthly security updates Tuesday, fixing 45 unique vulnerabilities across its products, three of which are publicly known and two already targeted by hackers.
Lucian Constantin |
12 Apr |
Read more
Starting in September, publicly trusted certificate authorities will have to honor a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.
Lucian Constantin |
12 Apr |
Read more
The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit used in attacks for months and used it to target millions of users.
Lucian Constantin |
11 Apr |
Read more
None of the new alleged NSA exploits leaked by the Shadow Brokers hacking group poses an immediate threat to users.
Lucian Constantin |
11 Apr |
Read more
Attackers have been exploiting an unpatched vulnerability in Microsoft Word for the past few months to compromise computers and infect them with malware.
Lucian Constantin |
11 Apr |
Read more
Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.
Lucian Constantin |
08 Apr |
Read more
Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to install ransomware on servers.
Lucian Constantin |
07 Apr |
Read more
Endpoint security vendor F-Secure has acquired a behavior-based security application for macOS called Little Flocker that was developed by an independent researcher.
Lucian Constantin |
07 Apr |
Read more
A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.
Lucian Constantin |
06 Apr |
Read more
Apple fixed a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.
Lucian Constantin |
05 Apr |
Read more
Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.
Lucian Constantin |
05 Apr |
Read more
A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).
Lucian Constantin |
04 Apr |
Read more