The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies…
According to data provided by the CVE Details Apple Mac OS X is the software with the highest number of…
Bad news for PC users, Lenovo machines can be hijacked by visiting a malicious website, meanwhile Dell and Toshiba PC…
Evaluation of DHS Information Security Program for Fiscal Year 2015 revealed the existence of dozens of top-secret unpatched databases. The story I'm…
Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key…
The black box attacks are a new alarming trend in the criminal ecosystem, the experts Olga Kochetova and Alexey Osipov…
Security experts at Rapid7 firm have public disclosed a series of flaws affecting several thousands of critical infrastructure using Yokogawa…
Secunia's Vulnerability Review 2014 provides an interesting analysis of the number of vulnerabilities in the Top 50 portfolio products. The…
DARPA has launched the Crowd Sourced Formal Verification, it creates a set of games that search for software vulnerabilities involving…
The popular security expert Nir Goldshlager found a serious vulnerability that allows attackers to post spoofed messages from any application…
This website uses cookies.