vulnerability
Third-party software responsible for most vulnerabilities
Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …
Microsoft patches three Windows vulnerabilities
Today Microsoft released two security bulletins, one rated Critical and one rated Important, to address a total of three vulnerabilities in Microsoft Windows and Windows …
Database activity monitoring and vulnerability assessment
Sentrigo released Hedgehog Enterprise 4.1, a fully integrated database activity monitoring and vulnerability assessment solution. Hedgehog DBscanner now conducts checks for …
Mono ASP.NET source code disclosure vulnerability
Mono is an open source, cross-platform, implementation of C# and the CLR that is binary compatible with Microsoft.NET. A vulnerability has been reported in Mono, which can be …
Who profits on vulnerabilities for sale?
The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …
Microsoft to patch three vulnerabilities in Windows
Next week’s January’s security bulletins will contain two bulletins addressing three vulnerabilities in Windows. As usual, the bulletin release is scheduled for …
Exploit code for critical MS Office flaw exploit found in the wild
A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …
Critical vulnerability in ImgBurn
A vulnerability has been discovered in ImgBurn, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The vulnerability is …
All versions of Internet Explorer under threat
Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
Fake iTunes e-mail leads to drive-by download
E-mails purportedly coming from iTunes and bearing “iTunes account may be suspended” in the subject line have been hitting inboxes in the last few days. …
Mozilla expands its bug bounty program
Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation’s software with …
Featured news
Resources
Don't miss
- Your dependencies are 278 days out of date and your pipelines aren’t protected
- Security debt is becoming a governance issue for CISOs
- BlacksmithAI: Open-source AI-powered penetration testing framework
- When cyber threats start thinking for themselves
- IronCurtain: An open-source, safeguard layer for autonomous AI assistants