Eight of the top ten vulnerabilities used by exploit kits this year affect Adobe Flash Player, a new report from threat intelligence company Recorded...
Hi, what are you looking for?
Eight of the top ten vulnerabilities used by exploit kits this year affect Adobe Flash Player, a new report from threat intelligence company Recorded...
Comodo admitted on Monday that it had mistakenly issued a total of eight digital certificates that did not comply with baseline requirements.
The recently uncovered file-encrypting ransomware Linux.Encoder1 is plagued by a flaw that can be used to recover the files held for ransom by the...
A new report from security solutions provider Check Point provides further insight into the activities of the Iran-linked threat group known as Rocket Kitten.
Several popular Java-based products are affected by a serious vulnerability that can be exploited by malicious actors to remotely execute arbitrary code.
UK-based postcard-sending service Touchnote learned last week that its systems had been breached in an attack that resulted in customer details getting stolen.
Broadband communications company Cox has agreed to pay a heavy fine to settle allegations by the Federal Communications Commission (FCC) that it had failed...
Researchers at Russian antivirus company Doctor Web have come across a new file-encrypting ransomware that appears to be targeting machines running Linux operating systems.The...
TalkTalk reported on Friday that the personal details of only 156,959 customers were accessed in the recent data breach.
Ubiquiti Networks products have the remote administration feature enabled by default and a new flaw found by researchers at SEC Consult allows malicious hackers...
CryptoWall 4.0 has been released recently and the latest version of the notorious file-encrypting ransomware brings several notable changes.
Researchers at Avast have conducted a brief analysis of OmniRAT, a multi-platform remote administration tool (RAT) that has been used for malicious purposes.