vulnerability
Cybercriminals are preying on existing vulnerabilities to plan future attacks
Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified several campaigns targeting the bash vulnerability during …
New Android bug can put devices into a coma
In the wake of the explosive discovery of the Android Stagefright vulnerability, Trend Micro researchers have revealed the existence of another, similar one that can make …
Apple patches serious remotely exploitable iTunes and App Store flaw
Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple’s App Store and iTunes web apps, which can lead to …
Deplorable Steam security flaw exploited to hijack prominent accounts
A huge gaping hole that allowed attackers to hijack Steam accounts has been discovered, exploited last week, and finally closed by Valve Corp. this weekend.The attackers …
Security flaws discovered in popular Smart Home Hubs
Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …
OpenSSH bug enables attackers to brute-force their way into poorly configured servers
A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access …
Bug in OS X Yosemite allows attackers to gain root access
Security researcher Stefan Esser has revealed the existence of a privilege escalation vulnerability affecting OS X 10.10 (Yosemite), and has provided a working proof of …
Smartwatches: A new and open frontier for attack
Smartwatches with network and communication functionality represent a new and open frontier for cyberattack, according to HP. They found that 100 percent of the tested …
600TB of data exposed due to misconfigured MongoDB instances
Shodan, the search engine that lets users find devices connected to the Internet, can be used for a number of different things. As its creator, John Matherly, pointed out, …
Proposed Wassenaar pact changes will harm cyber defenders instead of attackers
The comment period for the proposed amendments to the Wassenaar Arrangement regarding “cybersecurity items” has ended, and the overwhelming majority of the 150+ …
Reflections on virtualization security and the VENOM vulnerability
Virtualization is undoubtedly a great IT tool that enables organizations to quickly run new instances of servers and workstations, helps isolate environments, and allows for a …
School monitoring software’s hard-coded encryption key exposed
Impero Software is the creator and seller of “Impero Education Pro”, a piece of software that’s used in many UK schools to monitor school computers for …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025