What you need to know about the critical security hole that could enable the next WannaCryptor
Attack attempts involving the exploit are in hundreds of thousands daily
The gaming company has rolled out a fix for the remote code execution vulnerability, so make sure you run the platform's latest version
The new wireless security protocol contains multiple design flaws that hackers could exploit for attacks on Wi-Fi passwords
Worse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads
The program with a prize pool of almost US$1 million aims to leverage the ‘power of the crowd’ in order to prevent another Heartbleed
Details are sparse about a security hole that Microsoft said is being exploited in targeted attacks
Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure
Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable
The slew of vulnerabilities – since patched – were found without the use of automated testing tools
But don’t get too excited just yet: the first-of-its-kind bug bounty program for printers is invite-only for now
Patches have already been released or are expected to see the light of day soon
One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago
Double zero-day vulnerabilities fused into one. A mysterious sample enables attackers to execute arbitrary code with the highest privileges on intended targets
The infamous outbreak may no longer be causing mayhem worldwide but the threat that enabled it is still very much alive and posing a major threat to unpatched and unprotected systems
The update plugs a security hole that exposes a million Drupal websites to attacks
In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.
"When looking for vulnerabilities in open-source code, it is advisable to check portions of code that is prone to errors": Useful tips from one of ESET's malware analysts, Matías Porolli, on how to spot vulnerable code.
Adobe Flash users find themselves in danger once again, as they wait for an emergency security patch to fix a vulnerability being actively exploited in the wild.
A security researcher describes how malware could infect your Mac's boot ROM, and spy on your activities, with little chance of you ever realising.