Information Security (Page 62)

Information security specialists reported the finding of two critical vulnerabilities affecting SolarWinds Serv-U. According to the report, successful exploitation of these flaws would allow the deployment of multiple attack scenarios.Read More →

Information security specialists reported the finding of multiple vulnerabilities in Apache Traffic Server. According to the report, successful exploitation of these flaws would allow compromising the affected systems. Below areRead More →

Cybersecurity specialists report the detection of at least 28 vulnerabilities in Qualcomm chipsets. According to the report, the successful exploitation of the flaws would allow the deployment of severe attackRead More →

A report by Markup says that Life360, a mobile family monitoring app used by around 30 million people worldwide, is selling some data collected in its systems, mainly those associatedRead More →

Cybersecurity specialists report that, for some years now, a hacker has been running malicious servers throughout the Tor network in what appears to be an attempt to deanonymize users ofRead More →

Pip-audit is a tool developed in collaboration with Google for scanning Python environments and detecting possible known security flaws. According to cybersecurity experts, Pip-audit uses the PyPi JSON API forRead More →