Software that writes more data to a memory buffer than it can hold creates vulnerabilities that attackers can exploit.
Stories by Lucian Constantin
The attackers customised the Magecart code to the Macy's website to steal credit card information in the wallet and new registrations.
Researchers have recently detected an advanced persistent threat campaign that targets critical infrastructure equipment manufacturers.
By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys.
Many phishing websites are now using unique user IDs, giving defenders a signal to detect phishing attacks before they do much damage.
Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.
Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware.
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.
Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.
Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system.
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication.
By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access.
A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
Much like customers, partners also require guidance on the key technologies and markets to pursue. Read the Channel Roadmap to build a blueprint for future success.