Please turn on your JavaScript for this page to function normally.
https
Amazon Silk browser removes Google’s default encryption

Google’s good intentions of keeping searches made via its search engine protected through default encryption have been stymied by Amazon. A bug in the Amazon Silk …

Critical holes in Micro Focus Filr found, plugged

Popular enterprise file management and collaborative file sharing solution Micro Focus Filr sports half a dozen security flaws, most of which can be exploited – either …

WarFrame
Warframe, Clash of Kings players’ info stolen after forum hacks

Two new website hack/ user data theft combos have been revealed last week, and the victims are players of popular mobile real time strategy game Clash of Kings and online …

Dell
Dell SonicWALL GMS comes with hidden default account

While developing new audit modules for the company’s vulnerability scanning technology, Digital Defense researchers found six vulnerabilities in Dell’s SonicWALL …

sap
Vulnerabilities affecting SAP HANA and SAP Trex put 10,000 customers at risk

Onapsis released new security advisories detailing vulnerabilities in SAP HANA and SAP Trex. Included in the advisories is a critical risk vulnerability that could be used to …

servers
Cisco plugs critical flaw in data center operations management solution

Cisco has patched another critical vulnerability in its Unified Computing System Performance Manager software. Cisco UCS Performance Manager is a data center operations …

jigsaw
Oracle splats 276 bugs with mammoth Critical Patch Update

In case you missed it, Oracle’s July 2016 Critical Patch Update is out, and it’s bigger than ever before. It plugs 276 security issues across hundreds of Oracle …

Dunlop
Slew of WP-based business sites compromised to lead to ransomware

If an approach works well, there is no reason to change tack, and the masters of the SoakSoak botnet are obviously of the same belief. A year and a half after they have been …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

httpoxy
Widespread httpoxy vulnerabilities affect server-side web apps

A new, branded set of vulnerabilities has been revealed by security researchers, this time responsibly and without too much fanfare. The collective name given to the …

dollar
How to steal money from Instagram, Google and Microsoft

Some account options deployed by Instagram, Google and Microsoft can be misused to steal money from the companies by making them place phone calls to premium rate numbers, …

Joomla!
Compromised Joomla sites are foisting ransomware on visitors

Administrators of WP and Joomla sites would do well to check for specific fake analytics code injected into their properties, as a ransomware delivery campaign taking …

Don't miss

Cybersecurity news