Security

SourMint SDK used by 1200 iOS apps shows malicious behavior

Experts at security firm Snyk discovered a malicious behavior in an advertising SDK that is used in more than 1,200…

5 years ago

A Google Drive weakness could allow attackers to serve malware

A bug in Google Drive could be exploited by threat actors to distribute malicious files disguised as legitimate documents or…

5 years ago

Adobe released open- source tool Stringlifier to identify randomly generated strings

Adobe has released an open-source tool, dubbed Stringlifier, that allows users to identify randomly generated strings in any plain text,…

5 years ago

Thousands of WordPress WooCommerce stores potentially exposed to hack

Hackers are attempting to exploit multiple vulnerabilities in the Discount Rules for WooCommerce WordPress plugin, which has 30,000+ installations. Researchers from security…

5 years ago

Mozilla offers rewards for Bypassing Firefox Exploit Mitigations

Mozilla has expanded its bug bounty program including rewards for bypass methods for the exploit mitigations and security features in…

5 years ago

Microsoft Out-of-Band security patch fixes Windows privilege escalation flaws

Microsoft released an Out-of-Band security update to address privilege escalation flaws in Windows 8.1 and Windows Server 2012 R2 systems.…

5 years ago

Shared memory flaw in IBM Db2 can lead to Information Disclosure

IBM addressed a shared memory vulnerability in its Db2 data management solutions that could lead to information disclosure. IBM fixed…

5 years ago

CVE-2020-3446 default credentials bug exposes Cisco ENCS, CSP Appliances to hack

Cisco addressed a critical default credentials vulnerability (CVE-2020-3446) affecting some configurations of its ENCS 5400-W series and CSP 5000-W series…

5 years ago

A flaw in Concrete5 CMS could have allowed website takeover

A remote code execution (RCE) vulnerability affecting the Concrete5 CMS exposed numerous servers to full takeover, experts warn. A recently…

6 years ago

Critical flaw in Jenkins Server can cause information disclosure

A critical vulnerability in Jenkins server software could result in memory corruption and cause confidential information disclosure. A critical vulnerability…

6 years ago

This website uses cookies.