Security vulnerabilities stories
Secure Code Warrior launches Missions, an interactive platform that allows developers to practice coding skills and tackle real-world security vulnerabilities.
84% of companies have high-risk vulnerabilities on their network perimeter, with half of them fixable through software updates, says Positive Technologies.
GitHub has recently rolled out code scanning to help developers detect and prevent vulnerabilities from popping up in their open source and enterprise code.
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.
Manufacturers using Wibu-Systems CodeMeter are urged to update to version 7.10 due to vulnerabilities that could allow attackers to take control of OT networks.
One in three IT environments vulnerable to Ripple20 cyber threat, says ExtraHop. Attackers can exploit 19 vulnerabilities in the Treck networking stack.
The vulnerabilities have the potential to 'ripple' through complex software supply chains, enabling attackers to steal data or execute code.
Vulnerable VPN servers and clients used in critical industries have been discovered by cybersecurity firm Claroty, potentially leading to security breaches.
The vulnerability (CVE-2020-6287) could allow attackers to take over SAP systems by remotely accessing the server.
Prevasio launches industry's first dynamic threat and vulnerability analysis system for Docker containers. @PrevasioAnalyzer #Cybersecurity.
A range of optical line termination (OLT) devices made by China-based manufacturer and vendor C-DATA may be riddled with vulnerabilities and backdoors.
IOT Data Centers adds new facility in Melbourne to its network of geographically distributed data centers. Now accepting customers.
Since early January 2020, the number of internet-accessible Cisco ASA devices considered vulnerable has jumped from 170,000 to 220,000.
A blog post from security vendor ESET has outlined the risk of the zero-day for those who are still using the relic browser of internet-past.
Microsoft released an out-of-band patch for the vulnerability discovered by Google researchers due to the report that it has been exploited in the wild.
GitHub has announced new capabilities that make it easier for developers to report vulnerabilities directly from their repositories.
Apple clarifies that an iOS malware attack impacted fewer than a dozen Uighur-focused websites, dismissing Google's claims of mass exploitation.
A security flaw in Samsung, Huawei, LG, Sony and other Android phones leaves users open to SMS phishing attacks, Check Point Research reports.
The malware implant has been patched, but iPhone users should ensure they're running on the latest version of iOS (12.1.4) to leverage the security patches.
New Zealand-based Gallagher has become an authorised CVE Numbering Authority, allowing it to assign and communicate security vulnerabilities in its products.