Microsoft announced on Wednesday new changes and further expansion of its bug bounty programs.The company has decided to separate its Mitigation Bypass and Bounty...
Hi, what are you looking for?
Microsoft announced on Wednesday new changes and further expansion of its bug bounty programs.The company has decided to separate its Mitigation Bypass and Bounty...
LAS VEGAS - BLACK HAT USA 2015 - The cybercriminal ring behind the GameOver Zeus malware stole an estimated $100 million from banks, but...
The Internet Corporation for Assigned Names and Numbers (ICANN) has issued another security warning after login credentials for the ICANN.org website were compromised.
LAS VEGAS - BLACK HAT USA 2015 - Researchers at Invincea have tested the effectiveness of an automated analysis system that focuses on the...
Domain name registrar Hover has reset user passwords after discovering that one of its systems might have been breached.Hover is a subsidiary of Canada-based...
Popular cloud storage services such as Google Drive and Dropbox can be abused by malicious actors in what experts call “Man-in-the-Cloud” (MITC) attacks.
Flaws in Symantec Endpoint Protection Could Allow Hackers to Compromise Corporate Networks
Researchers at Trend Micro have reported finding a second denial-of-service (DoS) vulnerability in Android’s “mediaserver” component.
The developers of the WordPress content management system (CMS) today announced the release of version 4.2.4. This security release addresses six vulnerabilities and four...
Researchers at RSA have conducted an in-depth analysis of a Chinese virtual private network (VPN) service that has been used by advanced persistent threat...
A critical denial-of-service (DoS) vulnerability in the Domain Name System (DNS) software BIND is being exploited in the wild, researchers have warned.
An unpatched local privilege escalation vulnerability in Apple’s OS X operating system has been exploited by malicious actors to install adware and other suspicious...