Vulnerability

The Highly Competitive Web Application Firewall Market

The Highly Competitive Web Application Firewall Market

The Internet continues to be a rich environment for vulnerability scans against weak websites and web hosting facilities. Businesses with a web presence are the most attacked entities on the…

Read More
TOP 10 PHP Vulnerability Scanners

TOP 10 PHP Vulnerability Scanners

In today’s world, automation is the name of the game. People expect a faster way to do the job, to meet deadlines and settle obligations. Same goes with the security…

Read More
Open EDR
Nasty Linux Kernel Vulnerability Discovered Mandatory Kernel Update Required

Nasty Linux Kernel Vulnerability Discovered, Mandatory Kernel Update Required

The Linux Kernel since version 3.16 to 4.18.8 has an unfixed vulnerability, as disclosed by Google Project Zero. The vulnerability was first exposed by Jann Horn, a cybersecurity researcher under…

Read More
No Takers for Zero Day Vulnerabilities on the Dark Web

No Takers for Zero-Day Vulnerabilities on the Dark Web

According to experts vulnerability sales have been all but driven off the dark web, which now operates in the open. For years the secretive market for zero-day exploits thrived in…

Read More
Google’s Vulnerability Scanning for Their Cloud Infrastructure in Beta

Google’s Vulnerability Scanning for Their Cloud Infrastructure in Beta

Google is engaging in a very competitive market in cloud storage and solutions sector. It is a growth market where the search giant is wrestling arms with Amazon Cloud Services,…

Read More
Windows Task Manager’s Zero day Vulnerability Detected by ESET

Windows Task Manager’s Zero-day Vulnerability, Detected by ESET

Windows Task Scheduler was Microsoft’s answer to Unix Cron, for the purpose of running applications, scripts, and batch commands on-schedule. It was first released as an add-on option for Windows…

Read More
Android OS API Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Android OS API-Breaking Vulnerability Helps Hackers Steal Useful WiFi Data

Researchers have uncovered an “API-breaking” vulnerability, which could expose Android device systems data to rogue apps. The sensitive information thus exposed could be misused by cybercriminals. Security researchers from Nightwatch…

Read More
EE Hit by Two Security Vulnerabilities

UK Based Firm EE Hit by Two Security Vulnerabilities

As revealed by Tech Crunch, the UK-based telecommunication firm EE, endured recurrent flaws in its online system. In one week, EE fixed two security vulnerabilities that could potentially impact their…

Read More
Unpatched Remote Code Execution in Ghostscript Revealed by Google

Unpatched Remote Code Execution in Ghostscript Revealed by Google

Ghostscript, a mainstream raster image processor and back-end raster image converter for PDF has been discovered of harboring a critical vulnerability, a zero-day remote code execution flaw. Ghostscript is an…

Read More
Understanding Business Intelligence and Data Security 2

Adobe Released Security Patches For Photoshop Vulnerabilities

Adobe has released its latest security patches that would help fix the multiple critical vulnerabilities that have been detected in Adobe Photoshop CC 19.1.5 and earlier 19.x versions, as well…

Read More

Page 7 of 13

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register