Security News

Immediate App Updating Required to Protect Apple and Android Device UsersFacebook is warning users of its WhatsApp messaging app to update immediately to fix a flaw that is being used to remotely...

Rap for surveillanceware chaps in chat app voice yap trap flap – now everyone patch A security flaw in WhatsApp can be, and has been, exploited to inject spyware into victims' smartphones: all a...

Using a bug patched in March, the attacks are starting to ramp up worldwide.

Turla Cyber Espionage Group's 5-Year Campaign Hit Three Targets, ESET WarnsA sophisticated nation-state spy network has quietly exploited a backdoor in Microsoft Exchange servers that gave...

Snowballing attacks using a recently patched critical bug show no sign of abating.

Researchers at Onapsis Say Attacks Could Focus on NetWeaver PlatformNew exploits released online that target long-known configuration weaknesses in SAP's NetWeaver platform could pose risks to...

The good news is: The development of new malware exploits has slowed considerably. The bad news is: That's because the old ones still continue to work so effectively. Adam Kujawa of Malwarebytes...

Organizations using SAP business applications have been warned that the risk of attacks involving some old configuration issues has increased after researchers released proof-of-concept (PoC)...

Two exploits publicly released in late April at the OPCDE security conference in Dubai could be leveraged to compromise a great number of SAP implementations, Onapsis has warned. A successful...

A recently observed variant of the Muhstik botnet is exploiting a recently disclosed Oracle WebLogic server vulnerability for cryptomining and distributed denial of service (DDoS) attacks. read more