Please turn on your JavaScript for this page to function normally.
Researchers identify first flaws in the Advanced Encryption Standard

Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by …

Adobe acknowledges the 80 Flash Player bugs found by Google

Following Adobe’s latest release of patches for a number of its products, a discussion was started by Google researcher Tavis Ormandy who claimed that he himself has …

Vulnerability in TimThumb WordPress plugins: The effects

With the popularity of the WordPress blogging platform, security researchers here at Websense Security Labs are sure to sit up and take note of any reported zero-day threats …

Dropbox for Android security bypass vulnerability

A security issue has been reported in Dropbox for Android, which can be exploited by malicious people to bypass certain security restrictions, according to Tyrone Erasmus of …

The security of SAP J2EE Engine

Nowadays the SAP NetWeaver platform is the one of the most widespread platforms for developing and integrating enterprise business applications. It’s becoming a popular …

Multiple vulnerabilities in Symantec Endpoint Protection Manager

Multiple vulnerabilities have been discovered in Symantec Endpoint Protection Manager, which can be exploited by malicious people to conduct cross-site scripting and request …

TYPO3 multiple vulnerabilities

Multiple vulnerabilities have been reported in TYPO3, according to Secunia. These can be exploited by malicious users to bypass certain security restrictions, conduct script …

Zero-day bug found in WordPress themes

A bug in a popular WordPress utility is being misused by attackers to upload and make appear on the targeted site annoying and possibly malicious content. The bug was …

Facebook introduces bug bounty program

Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …

Half of organizations face downtime due to patching

53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …

Samba XSS and request forgery vulnerabilities

Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …

phpMyAdmin multiple vulnerabilities

Multiple vulnerabilities have been reported in phpMyAdmin, according to Secunia. These can be exploited by malicious users to conduct cross-site scripting attacks and …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools