DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…
A security bug in the WordPress plugin WP-Slimstat could be exploited by attackers to discover a “secret” key and use…
A security advisory issued by Drupal assumes that every installation of the popular CMS based in the version 7.x was…
The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…
Yahoo! Contributors Network was affected by a serious Time based Blind SQL Injection vulnerability which allows the theft of sensitive…
The Egyptian hacker Ebrahim Hegazy has discovered a critical Yahoo SQL Injection flaw exploitable to Remote Code Execution and privilege…
Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor.…
A new study conducted by the Ponemon Institute reveals the impact of successfully SQL injection attacks on organizations during the…
The security expert Ibrahim Raafat discovered critical SQL injection vulnerabilities in Flickr Photo Books which allow attackers to gain complete…
The German security researcher David Vieira-Kurz discovered a critical vulnerability in the Ebay website that allows an attacker a remote code…
This website uses cookies.