Security News

North Koren hackers are exploiting a recently patched vulnerability in Microsoft's VBScript engine vulnerability read more

The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

The issue impacts several content management systems, including Typo3 and WordPress, as well as widely-used PDF generation library TCPDF.

What are the Foreshadow/ L1TF exploits? Which chips are affected? How to secure your systems.

Samsung Galaxy S7 smartphones are left open to hacking with microchip security flaw, according to research at the Black Hat conference.

Crowdfense announced the launch of their Vulnerability Research Platform (VRP). This web-based collaboration platform allows vulnerability researchers to safely submit, discuss and quickly sell...

Malvertising Campaign Steals Traffic From 10,000 Hacked WordPress Sites and Exploits the Online Advertising Supply Chain read more

364 of them hacked the JPay tablets they use for email, music and games and transferred money into their own accounts.

PIR Bank Robbed by Russia's MoneyTaker Gang, Investigators SayHackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a...

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as operational technology (OT)...