Security Explorations has published details and proof-of-concept (PoC) code for several unconfirmed and unpatched vulnerabilities impacting Google App Engine for Java.
Hi, what are you looking for?
Security Explorations has published details and proof-of-concept (PoC) code for several unconfirmed and unpatched vulnerabilities impacting Google App Engine for Java.
Crowdstrike disclosed this week the existence of VENOM, a serious vulnerability affecting many virtualized environments.
United Airlines has announced the launch of a bug bounty program, offering independent researchers who identify security holes in the company’s online services the...
Cisco Finds Serious Flaws in TelePresence Products During Security ReviewsSoftware updates released by Cisco address several vulnerabilities in Cisco TelePresence products. The flaws have...
Researchers at SEC Consult have identified some serious flaws in WSO2 Identity Server. The vendor has released patches to address the security bugs.WSO2 Identity...
Romania-based security solutions provider Bitdefender announced on Wednesday a new technology designed to help virtualization vendors and datacenter administrators detect and block sophisticated threats.Bitdefender...
The Chinese threat actor known as APT17 and DeputyDog has been using profile pages and forum threads on Microsoft’s TechNet web portal to host...
OSIsoft Resolves Security Bypass Vulnerability in PI AF ProductOSIsoft customers are advised to take steps to mitigate an incorrect default permissions vulnerability affecting the...
Security firm Crowdstrike has revealed the existence of a serious vulnerability affecting several popular virtualization platforms.
APT28, the notorious cyber espionage group that is believed to be sponsored by the Russian government, is planning to attack various financial institutions from...
Firefox 38 was made available for download on Tuesday. Mozilla has addressed a total of 13 vulnerabilities in the latest version of its web...
Researchers at Incapsula have identified a massive distributed denial-of-service (DDoS) botnet made up of hijacked small office and home (SOHO) routers.