Experts at security firm Snyk discovered a malicious behavior in an advertising SDK that is used in more than 1,200…
A bug in Google Drive could be exploited by threat actors to distribute malicious files disguised as legitimate documents or…
Adobe has released an open-source tool, dubbed Stringlifier, that allows users to identify randomly generated strings in any plain text,…
Hackers are attempting to exploit multiple vulnerabilities in the Discount Rules for WooCommerce WordPress plugin, which has 30,000+ installations. Researchers from security…
Mozilla has expanded its bug bounty program including rewards for bypass methods for the exploit mitigations and security features in…
Microsoft released an Out-of-Band security update to address privilege escalation flaws in Windows 8.1 and Windows Server 2012 R2 systems.…
IBM addressed a shared memory vulnerability in its Db2 data management solutions that could lead to information disclosure. IBM fixed…
Cisco addressed a critical default credentials vulnerability (CVE-2020-3446) affecting some configurations of its ENCS 5400-W series and CSP 5000-W series…
A remote code execution (RCE) vulnerability affecting the Concrete5 CMS exposed numerous servers to full takeover, experts warn. A recently…
A critical vulnerability in Jenkins server software could result in memory corruption and cause confidential information disclosure. A critical vulnerability…
This website uses cookies.