Tag: Vulnerabilities
Open Source Software Flaws Rise by 130% in 2019: RiskSense
A recent study by vulnerability management firm RiskSense revealed that the number of open source software (OSS) vulnerabilities increased in 2019 compared to 2018.
The...
Cyberattacks on Automated Vehicles Rise by 99%: Report
A recent study from Uswitch, a UK-based price comparison service and switching website, stated that threat actors are constantly enhancing their attack vectors and...
Cybercriminals Tried to Access Database Logins of 1.3 Mn WordPress Sites
Cybercriminals targeted around 1.3 million WordPress websites in a single day to steal database login credentials. It is found that hackers tried to steal...
Indian Professionals to Set Up Intensive Cybersecurity Training Programs: JA Chowdary
Covid-19 has pushed everyone to go digital, but they need to adapt and learn to use digital assets securely, said JA Chowdary, IT Advisor,...
Ethical Hackers Earn US$100 Mn in Bounties on HackerOne Platform
Popular security and hacking platform, HackerOne recently announced that it paid ethical hackers $100 million in bounties so far for finding and reporting security...
4 Critical Responsibilities of a CISO Post COVID-19
Since the outbreak of the novel Coronavirus disease, organizations across the globe encountered dramatic changes in their business operations. The swift adaption of the...
Top 10 Commonly Exploited Vulnerabilities Between 2016-2019
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. government released a list of the top...
Millions of Computers Open to Thunderbolt Port Vulnerabilities
A security researcher at the Eindhoven University of Technology, Bjorn Ruytenberg, have discovered that Thunderbolt-equipped computers contain vulnerabilities that could leave millions of computers...
USAF Rewards Ethical Hackers $290,000 for Resolving 460 Vulnerabilities
The U.S. Department of Defense (DoD) recently concluded the fourth edition of its venerated bug bounty program, “Hack the Air Force 4.0.”, which was...
Mukashi Malware Exploits Zyxel NAS Device Vulnerabilities
Mirai malware that turns networked devices into remotely controlled bots has relaunched itself as Mukashi malware and has been actively exploiting Zyxel network-attached storage...