Editor's Pick

Buffer Overflow to Run Root Shell - Full Tutorial

Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced e...

Latest news

Unpatched Linux Marketplace Bugs Allow Wormable Attacks, Drive-By RCE

A pair of zero-days affecting Pling-based marketplaces could allow for some ugly attacks on unsuspecting Linux enthusiasts -- with no patches in...

Threatpost | 39 minutes ago
SonicWall ‘Botches’ October Patch for Critical VPN Bug

Company finally rolls out the complete fix this week for an RCE flaw affecting some 800,000 devices that could result in crashes or prevent users...

Threatpost | an hour ago
Despite Heightened Cyber-Risks, Few Security Leaders Report to CEO

A new report suggests that top management at most companies still don't get security.

Dark Reading | 14 hours ago
BEC Losses Top $1.8B as Tactics Evolve

BEC attacks getting are more dangerous, and smart users are the ones who can stop it.

Threatpost | 15 hours ago
Cryptominers Slither into Python Projects in Supply-Chain Campaign

These code bombs lurk in the PyPI package repository, waiting to be inadvertently baked into software developers' applications.

Threatpost | 17 hours ago
Transmit Security Announces $543M Series A Funding Round

The passwordless technology provider says the funding will be used to increase its reach and expand primary business functions.

Dark Reading | 17 hours ago
Email Bug Allows Message Snooping, Credential Theft

A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop on messages has been patched.

Threatpost | 18 hours ago
Chart: Strength in Numbers

More companies are heeding expert advice to beef up their incident-response teams.

Dark Reading | 18 hours ago
NSA Funds Development & Release of D3FEND Framework

The framework, now available through MITRE, provides countermeasures to attacks.

Dark Reading | 19 hours ago
Identity Eclipses Malware Detection at RSAC Startup Competition

All 10 finalists in the Innovation Sandbox were focused on identity, rather than security's mainstay for the last 20 years: Malware detection.

Dark Reading | 19 hours ago
Majority of Web Apps in 11 Industries Are Vulnerable All the Time

Serious vulnerabilities exist every day in certain industries, including utilities, public administration, and professional services, according to...

Dark Reading | 19 hours ago
Kids’ Apps on Google Play Rife with Privacy Violations

One in five of the most-popular apps for kids under 13 on Google Play don't comply with COPPA regulations on how children's information is...

Threatpost | 20 hours ago
Lexmark Printers Open to Arbitrary Code-Execution Zero-Day

“No remedy available as of June 21, 2021," according to the researcher who discovered the easy-to-exploit, no-user-action-required bug.

Threatpost | 20 hours ago
7 Powerful Cybersecurity Skills the Energy Sector Needs Most

Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.

Dark Reading | 21 hours ago
Does Your Cyberattack Plan Include a Crisis Communications Strategy? 5 Tips to Get Started

Don't overlook crisis communications in your cybersecurity incident response planning.

Dark Reading | 22 hours ago
Six Flags to Pay $36M Over Collection of Fingerprints

Illinois Supreme Court rules in favor of class action against company’s practice of scanning people’s fingers when they enter amusement parks.

Threatpost | a day ago
Did Companies Fail to Disclose Being Affected by SolarWinds Breach?

The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.

Dark Reading | a day ago
Software-Container Supply Chain Sees Spike in Attacks

Attackers target companies' container supply chain, driving a sixfold increase in a year, aiming to steal processing time for cryptomining and...

Dark Reading | a day ago
Wegmans Exposes Customer Data in Misconfigured Databases

Cleanup in aisle "Oops": The supermarket chain said that it misconfigured two cloud databases, exposing customer data to public scrutiny.

Threatpost | a day ago
Data Leaked in Fertility Clinic Ransomware Attack

Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack.

Dark Reading | a day ago
Bugs in NVIDIA’s Jetson Chipset Open Door to DoS Attacks, Data Theft

Chipmaker patches nine high-severity bugs in its Jetson SoC framework tied to the way it handles low-level cryptographic algorithms.

Threatpost | a day ago
Baltimore County Public Schools' Ransomware Recovery Tops $8M

The school district has spent seven months and a reported $8.1 million recovering from the November attack.

Dark Reading | a day ago
How Cyber Safe is Your Drinking Water Supply?

Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some...

Krebs on Security | a day ago

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.