Research Shows Many Security Products Fail to Detect Android Malware Variants
Research Shows Many Security Products Fail to Detect Android Malware Variants

Research Shows Many Security Products Fail to Detect Android Malware Variants

2021-06-22 10:10

A group of academic researchers has created a tool that can be used to clone Android malware and...

Peloton's $3,000 treadmill now comes with surprise 'subscription fee'

Peloton's $3,000 treadmill now comes with surprise 'subscription fee'

2021-06-22 08:35

Peloton has now introduced a $39.99 monthly subscription fee for its high-end treadmill product...

US Air Force announces plan to assassinate molluscs with hypersonic missile

US Air Force announces plan to assassinate molluscs with hypersonic missile

2021-06-22 08:31

No word on whether top brass considered just shelling them into submission The United States Air...

To CAPTCHA or not to CAPTCHA? Gartner analyst says OK — but don’t be robotic about it

To CAPTCHA or not to CAPTCHA? Gartner analyst says OK — but don’t be robotic about it

2021-06-22 08:06

Picking street signs from a matrix of images is out, cleverer challenges are OK Poll Analyst...

Malicious PyPI packages hijack dev devices to mine cryptocurrency

Malicious PyPI packages hijack dev devices to mine cryptocurrency

2021-06-22 07:49

This week, multiple malicious packages were caught in the PyPI repository for Python projects...

Best practices for IT teams to prevent ransomware attacks

Best practices for IT teams to prevent ransomware attacks

2021-06-22 05:30

According to Check Point research, the number of organizations affected by ransomware has been...

Driving network transformation with unified communications

Driving network transformation with unified communications

2021-06-22 05:00

Unified communications (UC) has become a significant part of an organization’s digital...

Vulnerabilities by Risk level (Last 12 months)

Risk level Last 12 months #
Critical 1401
High 2812
Medium 11534
Low 2899

Vulnerabilities by Vendor (Last 12 months)

Vendor Last 12 months #
Google 1224
Microsoft 1223
Cisco 748
Oracle 744
Fedoraproject 733

Latest Vulnerabilities

  • CVE-2010-1432

    0.0

    Joomla! Core is prone to an information disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may help in launching further attacks. Joomla! Core versions...

  • CVE-2010-1433

    0.0

    Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability...

  • CVE-2010-1434

    0.0

    Joomla! Core is prone to a session fixation vulnerability. An attacker may leverage this issue to hijack an arbitrary session and gain access to sensitive information, which may help in launching...

  • CVE-2010-1435

    0.0

    Joomla! Core is prone to a security bypass vulnerability. Exploiting this issue may allow attackers to perform otherwise restricted actions and subsequently retrieve password reset tokens from the...

  • CVE-2021-35196

    0.0

    ** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the...

Latest Critical Vulnerabilities