Please turn on your JavaScript for this page to function normally.
Broken glass
E-commerce web apps vulnerable to hijacking, database compromise

High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …

point
Why a single point of failure should be your primary concern

Many organizations are transitioning to digital systems, which has increased the dependency on cloud service providers, web hosting platforms, and other external services. …

terminal
Critical Glibc flaw opens Linux distros, other software and devices to compromise

A critical bug has been found to open an unimaginable number of computers, networking and other connected devices to attacks that can result in complete system compromise. …

Magento
Year-old critical Magento flaw still exploited, payment info stolen

A whole year has passed since a critical e-shop hijacking flaw in the Magento CMS has been patched, but the vulnerability is still being exploited in attacks in the wild, …

Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco Adaptive Security Appliance (ASA) products – appliances, firewalls, switches, routers, and security modules – have been found sporting a flaw that …

Broken glass
Flaw in Sparkle Updater for Mac opens users of popular apps to system compromise

A security engineer has recently discovered a serious vulnerability in Sparkle, the widely used open source software update framework for Mac applications, that could be …

Comodo Dragon
Comodo Internet Security installs insecure Chrome-based browser

Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …

Fisher-Price Smart Toy
Security flaws discovered in smart toys and kids’ watches

Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …

Malwarebytes
Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program

Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …

Android
Google plugs five critical Android vulnerabilities

Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …

eBay
Severe and unpatched eBay vulnerability allows attackers to distribute malware

Check Point researchers have discovered a severe vulnerability in eBay’s online sales platform, which allows criminals to distribute malware and run phishing campaigns. …

HP
Is your HP enterprise printer hosting malware for hackers?

“If you’re concerned about security, put your printers are behind a firewall and, if it’s a Hewlett-Packard, make sure port 9100 isn’t open,” says security …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools