Security news

The latests cybersecurity news

29 minutes agoSupreme Court won’t consider case against defamatory reviews on Yelp
The decision means Yelp, and other platforms, are still protected from liability for user-submitted content under the CDA's Section 230....

32 minutes agoMilitary Carrier Pigeons in the Era of Electronic Warfare
They have advantages: Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon'...
37 minutes agoLearn Python Programming – 7 Courses Video Training Bundle
It's no secret that learning how to code is one of the most important things you can do when it comes to the beginning or furthering practically any career in programming and technology. The only pro...
an hour agoHow to stop a hacker home invasion! [VIDEO]
Did you see the story about the US family whose Nest camera "warned" them of an impending nuclear attack? Here's how to keep hackers out......
an hour agoMillions of PCs Found Running Outdated Versions of Popular Software
It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security...

an hour agoCisco Patches Flaws in Webex, SD-WAN, Other Products
Cisco on Wednesday informed customers that security updates are available for several of the company’s products, including SD-WAN, Webex, Firepower, IoT Field Network Director, Identity Services Engin...
an hour agoUpdate now! Apple releases first 2019 iOS and macOS patches
Apple has issued its January security updates fixing a list of mostly shared CVE flaws affecting iOS and macOS with a smattering for Safari, watchOS, tvOS, and iCloud for Windows....
an hour ago3 enterprise cybersecurity trends CISOs must pay attention to
With the CISO at the table, organizations must focus on products, processes, and people to stay secure, according to the executive director of the National Cyber Security Alliance....
an hour agoAttackers Use Steganography to Obfuscate PDF Exploits
A recently discovered PDF exploit used steganography to hide malicious JavaScript code in images embedded in PDF files, according to exploit analysis firm EdgeSpot....
2 hours ago“Proceed with caution”: Microsoft browser says Mail Online is untrustworthy
Hanging up on the fact-checkers probably isn't the best way for a news outlet to assure them that it's trustworthy....

Threat Activity

Malicious IP addresses in the last 30 days

Top Countries

Last 30 days

    Top Categories

    Last 30 days

      Vulnerabilities

      The latest vulnerabilities publications

      Risk levels

      Last 30 days
      • 79 Critical
      • 67 High
      • 518 Moderate
      • 112 Low

      Top Vendors

      Last 30 days
      • 152 Oracle
      • 89 Adobe
      • 53 Google
      • 50 Microsoft
      • 49 Debian

      Top Categories

      Last 30 days
      • 155 Improper Access Control
      • 115 Cross-Site Scripting (XSS)
      • 77 Out-of-bounds Read
      • 64 Buffer Errors
      • 47 Input Validation
      • 43 Information Leak / Disclosure
      • 38 Use After Free

      Authentication

      Last 30 days
      • 622 None
      • 154 Single
      • 0 Multiple

      Access Vector

      Last 30 days
      • 686 Network
      • 9 Adjacent Network
      • 81 Local