vulnerability
Facebook introduces bug bounty program
Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …
Half of organizations face downtime due to patching
53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …
Samba XSS and request forgery vulnerabilities
Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …
phpMyAdmin multiple vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, according to Secunia. These can be exploited by malicious users to conduct cross-site scripting attacks and …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
Trend Micro Control Manager file disclosure vulnerability
A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …
SquirrelMail multiple vulnerabilities
Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
SAP NetWeaver multiple vulnerabilities
Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, …
Citigroup data theft the result of a common vulnerability
If the information the NYT has received about the Citigroup breach is correct, and the intrusion was made possible by the exploitation of a vulnerability so frequent and …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation