Security News

And on GitHub there's a proof-of-concept that'll render your system unbootable.

The flaw in the popular file uploader allows an attacker to upload files and run their own command line shell on any affected server.

Thousands of projects are possibly impacted by a jQuery File Upload plugin vulnerability that has been actively exploited in the wild, a security researcher has discovered. read more

Flaw allows a local user to obtain System privileges.

Local privilege escalation in procedure calls It's not bad enough to take Microsoft out-of-cycle, but CERT/CC has just put out a warning of a new privilege escalation bug in Windows.…

Apple 0-Day allows hackers to mimic mouse-clicks for kernel access, despite mitigations.

Crowdfense announced the launch of their Vulnerability Research Platform (VRP). This web-based collaboration platform allows vulnerability researchers to safely submit, discuss and quickly sell...

Exploits and vulnerabilities are weaponized against us 24 hours after release, says technical director.

Hackers willing to find unpatched vulnerabilities in the Linux operating system and report them to exploit acquisition firm Zerodium can earn up to $45,000 for their findings, the company...

A security researcher on New Year's eve made public the details of an unpatched security vulnerability in Apple's macOS operating system that can be exploited to take complete control of a system....