Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 10
The Zero Day Initiative said that the number of bugs reported in 2018 is on track to trump its previous busiest year, 2017.
Researcher brings Apple down to earth, addressing Mac malware questions and the company’s smart moves to bolster security.
The Rakhni Trojan is now giving bad actors the ability to infect victims either with a ransomware cryptor or a miner.
InfoSec Insider Chris Eng tackles how companies can bring bridge the divide between software developers and cybersecurity teams to bring to market reliable and secure applications.
The July Android Security bulletin tackles 44 vulnerabilities in all, with the bulk rated high in severity.
Broadband gear made by Advanced Digital Broadcast is being patched to fix three vulnerabilities rated critical.
A look at the underground cybercrime landscape in 2018 shows a dynamic and quick-reacting community in the face of a successful crackdowns by law enforcement.
More companies are looking to adopt “safe harbor” language in their bug bounty programs to build trust with participants.
Here is a look at what exploit kits, CVEs and other web-based threats are keeping security professionals working overtime in 2018.
The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.
... 67891011121314 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...