Home
Solutions
News
About Us
Contacts
Tag:
Vulnerabilities
You are here:
Home
\ Vulnerabilities \ Page 2
Fortnite Android App Falls Victim to Man-in-the-Disk Flaw
27 August 2018 - 16:13, by , in
News
,
No comments
After Google publicized the flaw seven days after a patch was issued, the Epic Games CEO called out the company for irresponsible disclosure.
Read More
PoC Code Surfaces to Exploit Apache Struts 2 Vulnerability
24 August 2018 - 22:07, by , in
News
,
No comments
Researchers find proof-of-concept code that can take advantage of the recently identified Apache Struts framework (CVE-2018-11776) vulnerability.
Read More
Mirai Variant Cross-Compiles Attack Code with Aboriginal Linux
24 August 2018 - 19:32, by , in
News
,
No comments
The approach makes Mirai executable on a wide variety of disparate IoT devices and platforms from a single server.
Read More
T-Mobile Alerts 2.3 Million Customers of Data Breach Tied to Leaky API
24 August 2018 - 16:42, by , in
News
,
No comments
T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen.
Read More
Cross-Site Scripting Flaw in Apache ActiveMQ Threatens Web Visitors
24 August 2018 - 15:25, by , in
News
,
No comments
With the malicious code embedded into websites, the attacker can then piggyback on the trust level of the website and launch a variety of attacks.
Read More
ThreatList: $1.1M is Lost to Cybercrime Every Minute of Every Day
23 August 2018 - 20:55, by , in
News
,
No comments
Every minute, there are also 5,518 records leaked from publicly disclosed incidents.
Read More
Apache Struts 2 Flaw Uncovered: ‘More Critical Than Equifax Bug’
23 August 2018 - 16:46, by , in
News
,
No comments
Apache has patched a critical remote code-execution vulnerability in Struts 2, and users should update immediately.
Read More
Security and Artificial Intelligence: Hype vs. Reality
23 August 2018 - 15:05, by , in
News
,
No comments
Bridging the divide between hype and reality when it comes to what artificial intelligence and machine learning can do to help protect a business.
Read More
Unpatched Ghostscript Flaws Allow Remote Takeover of Systems
22 August 2018 - 19:55, by , in
News
,
No comments
A remote, unauthenticated attacker could execute arbitrary commands on systems with the privileges of the Ghostscript code.
Read More
Researchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities
22 August 2018 - 17:10, by , in
News
,
No comments
With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity.
Read More
Prev
1
2
3
4
5
6
7
8
9
...
18
...
27
...
36
...
45
...
54
...
63
...
72
...
81
...
90
...
99
...
108
...
117
...
126
...
Next
Recent Posts
MagentoCore Card Skimmer Found on Mass Numbers of E-Commerce Sites
Threatpost News Wrap Podcast For Aug. 31
Bucking the Norm, Mozilla to Block Tracking Cookies in Firefox
ThreatList: Security Pros Confident They Could Compromise Their Own Orgs
New Threat Actor ‘Rocke’: A Rising Monero Cryptomining Menace
Archives
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
Categories
Data loss
Featured
Law & order
Malware
News
Security threats
Uncategorized
Vulnerabilities
Tags
Adobe
Android
Apple
APT
Black Hat
bug bounty
Cisco
Cloud Security
critical infrastructure
Cryptography
data breach
Data Breaches
DDoS
Encryption
Facebook
FBI
Featured
Firefox
Google
Government
Hacks
https
Internet of things
ios
iot
IoT security
Kaspersky Lab
Linux
Malware
Microsoft
Mobile Security
NSA
patch tuesday
Phishing
Podcasts
Privacy
ransomware
remote code execution
Security Analyst Summit
Uncategorized
Vulnerabilities
Vulnerability
WannaCry
Web Security
Windows