Blog: In The News
You are here: Home \ Blog
A serious vulnerability was patched by developers behind Git that closes the door on a flaw that could lead to arbitrary code execution on a developer’s system.
The botnet operators behind two infamous trojans have banded together to gouge victims in a costly scheme.
Fortune 500 breaches seem to be a theme this week.
Google has rolled out its newest browser version (Chrome 67.0.3396.62) for Windows, Mac and Linux this week with new security fixes and biometric features.
The North Korean-sponsored actors are targeting sensitive and proprietary information, and the malware could disrupt regular operations and disable systems and files.
Two Canadian banks reported that they may be targets of a hack after fraudsters claimed that they electronically accessed personal and account information.
Virtual machines that use AMD’s hardware-based encryption scheme are vulnerable to attacks that can extract the full contents of their main memory – in plaintext.
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead to a system crash.
An exploit for the bypass vulnerability required an HTTP parameter pollution in a web application.
Researchers have discovered a banking trojan making waves in Brazil with an array of tricks up its sleeve, including using an unusual command and control (C&C) server.
... 282930313233343536 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ... 135 ... 144 ... 153 ... 162 ... 171 ... 180 ... 189 ... 198 ... 207 ... 216 ... 225 ... 234 ... 243 ... 252 ... 261 ...