security flaws (Page 28)

Cybersecurity specialists report that threat actors could track the online activity of Tor browser users to extract potentially sensitive information. This attack variant is known as Website Fingerprinting (WF). ThisRead More →

The team in charge of GoCD announced the fix of three vulnerabilities that could be exploited in a chained manner to take full control of the underlying server. These flawsRead More →

In its latest security alert, Hewlett Packard Enterprise (HPE) confirmed that the data repositories of its Aruba Central software solution were tapped by threat actors, who could access sensitive information.Read More →

After having been the victim of a ransomware attack a few weeks ago, the Toronto Transit Commission (TTC) confirmed that the information of thousands of employees and users could haveRead More →

Palo Alto Networks security team has issued a statement alerting its customers to a remote code execution (RCE) vulnerability in GlobalProtect, mentioning that threat actors can launch malicious code withRead More →

Cybersecurity specialists report the detection of various vulnerabilities in Adobe Audition, the sound editing tool developed by Adobe Systems. According to the report, the successful exploitation of these failures wouldRead More →

Building secure applications requires much more than just the knowledge of developers, as a properly protected environment requires an adequate analysis and the use of good security tools. That isRead More →

Bjørn Martin Hegnes is a computer science student who resides in Norway and has been using equipment for listening to Bluetooth and WiFi messages for academic purposes. As he mentions,Read More →