PoC Exploit Targeting Apache Struts Surfaces on GitHub
Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2.
Researchers have discovered freely available PoC code and exploit that can be used to attack unpatched security holes in Apache Struts 2.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The video-conferencing specialist has yet to roll out full encryption, but it says it’s working on it.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The APT is becoming more sophisticated over time.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called ‘ReVoLTE,’ that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The attack doesn’t exploit any flaw in…
Attention! If you use Amazon’s voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Cybersecurity researchers today disclosed severe security vulnerabilities in Amazon’s Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According…
Citrix said that it anticipates malicious actors “will move quickly to exploit” two critical flaws in its mobile device management software.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As software eats the world, the world faces a software security crisis. The movement to modern software such as cloud technologies and microservice architectures is essential to innovate quickly. Yet, nearly three in four developers say that security slows down Agile and DevOps. Neither developers nor security teams are to blame. DevOps speed is held…
New research disclosed a string of severe security vulnerabilities in the ‘Find My Mobile‘—an Android app that comes pre-installed on most Samsung smartphones—that could have allowed remote attackers to track victims’ real-time location, monitor phone calls, and messages, and even delete data stored on the phone. Portugal-based cybersecurity services provider Char49 revealed its findings on…