Home Tags Vulnerabilities

Tag: Vulnerabilities

Open Source Software Flaws Rise by 130% in 2019: RiskSense

0
A recent study by vulnerability management firm RiskSense revealed that the number of open source software (OSS) vulnerabilities increased in 2019 compared to 2018. The...

Cyberattacks on Automated Vehicles Rise by 99%: Report

0
A recent study from Uswitch, a UK-based price comparison service and switching website, stated that threat actors are constantly enhancing their attack vectors and...

Cybercriminals Tried to Access Database Logins of 1.3 Mn WordPress Sites

0
Cybercriminals targeted around 1.3 million WordPress websites in a single day to steal database login credentials. It is found that hackers tried to steal...

Indian Professionals to Set Up Intensive Cybersecurity Training Programs: JA Chowdary

0
Covid-19 has pushed everyone to go digital, but they need to adapt and learn to use digital assets securely, said JA Chowdary, IT Advisor,...

Ethical Hackers Earn US$100 Mn in Bounties on HackerOne Platform

0
Popular security and hacking platform, HackerOne recently announced that it paid ethical hackers $100 million in bounties so far for finding and reporting security...

4 Critical Responsibilities of a CISO Post COVID-19

0
Since the outbreak of the novel Coronavirus disease, organizations across the globe encountered dramatic changes in their business operations.  The swift adaption of the...

Top 10 Commonly Exploited Vulnerabilities Between 2016-2019

0
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. government released a list of the top...

Millions of Computers Open to Thunderbolt Port Vulnerabilities

0
A security researcher at the Eindhoven University of Technology, Bjorn Ruytenberg, have discovered that Thunderbolt-equipped computers contain vulnerabilities that could leave millions of computers...

USAF Rewards Ethical Hackers $290,000 for Resolving 460 Vulnerabilities

0
The U.S. Department of Defense (DoD) recently concluded the fourth edition of its venerated bug bounty program, “Hack the Air Force 4.0.”, which was...

Mukashi Malware Exploits Zyxel NAS Device Vulnerabilities

0
Mirai malware that turns networked devices into remotely controlled bots has relaunched itself as Mukashi malware and has been actively exploiting Zyxel network-attached storage...

MOST POPULAR

RECENT POSTS

x33fcon

IT Congress 2025

TechEd

CISO Perth 2025