Critical Atlassian 0-day is under active exploit. You’re patched, right?
Researchers who found vulnerability warn it's “dangerous and trivially exploited.”
Researchers who found vulnerability warn it's “dangerous and trivially exploited.”
No patch yet for easy-to-hack access point that leaks data and exposes networks to hacks.
All supported versions of Windows affected.
Trafficked data could lead to subsequent attacks, agency warns.
BMCs offer extraordinary control over cloud computers. So why hasn't Quanta patched?
If your machine failed to get them automatically, you're not alone.
Leak is latest bright light shined on China's persecution of ethnic minorities.
A litany of security flaws allows forgeries that are easy, quick, and cheap.
If you've used School Management Pro, it's time to check your site, stat.
All it takes to hijack Bluetooth-secured devices is custom code and $100 in hardware.
Security flaws in VMware and F5's BIG-IP are being exploited by malicious hackers.
Research is largely theoretical but exposes an overlooked security issue.
Flaw makes it possible to install web shell to maintain control of affected devices.
Dependency confusion attacks exploit our trust in public code repositories.
February outage came an hour before Russia began its invasion of Ukraine.
Flaw in widely used gear from F5 executes root commands, no password necessary.
You've heard for years that easier, more secure logins are imminent. That day is here.
Vulnerability in 3rd-party libraries can send devices' users to malicious sites.
Once-unknown group uses a tunnel fetish and a chameleon's ability to blend in.
15.3 million requests per second is HUGE, especially when delivered through HTTPS.
Cyberattacks complement and are sometimes timed to military actions.
Elevation of privilege vulnerabilities can be used to gain persistent root access.
Thousands of hack attempts made in the days following discovery of the vulnerability.
Flaw could be exploited with malicious audio file.
A failure to sanity check signatures for division-by-zero flaws makes forgeries easy.
Exploiting critical UEFI vulnerabilities could allow malware to hide in firmware.
Apple's landmark App Tracking Transparency may not be as tough as some people think.
Researchers have been in search of vulnerable real-world apps. The wait continues.
ALPHV/Black Cat ransomware group has claimed at least 3 victims so far.
Silently fixed authentication bypass remained a secret even after it was under attack.
How the FBI took down "Cyclops Blink," a Russia state botnet infecting network firewalls.
Hydra market facilitated $5 billion in transactions for 17 million customers.
Hackers can exploit authentication bypass flaw to gain administrative control.
Vulnerability in the Spring Java Framework is important, but it's no Log4Shell.
With 5 0-days this year, Apple is on track to meet or break its 2021 tally of 12.
AcidRain is the seventh wiper associated with the Russian invasion of Ukraine.
← Older Stories | |