Security News

Dan Patterson spoke with Patrick Sullivan, Akamai's Senior Director of Security Strategy, at Black Hat 2018 about vulnerabilities in IoT devices, SQL injections, DDoS, and other attack vectors.

A new report from Ben-Gurion University of Negev warns of potential attacks against urban water services.

Qualys announced that IBM X-Force Red will leverage the Qualys Cloud Platform as part of its X-Force Red Vulnerability Management Services (VMS). As part of an expanded relationship, X-Force Red...

A slew of vulnerabilities in OpenEMR allowed attackers to access random patients’ health records, view data from a target database, escalate their privileges on the server, execute system...

Samsung has patched a series of critical vulnerabilities in its SmartThings Hub, which could be exploited to execute OS commands or other arbitrary code on vulnerable devices. read more

A recently observed malicious campaign is abusing two chained Office documents, each exploiting a different vulnerability, to deliver the FELIXROOT Backdoor, FireEye reports. read more

Cisco Talos researchers have unearthed 20 vulnerabilities in the Samsung SmartThings Hub that could be leveraged by attackers to monitor, control and interfere with devices within the home. Among...

Analysis of vulnerabilities discovered by NCC Group researchers over the last nine years found that instances of common web-based vulnerabilities have largely refused to fall over during this...

A major challenge in industrial control system architecture involves the dual nature of its underlying technologies. That is, a typical ICS component must have the capability to exchange...

The Apache Software Foundation (ASF) has released security updates to address several vulnerabilities in its Tomcat application server, one of which could allow a remote attacker to obtain...