Vulnerabilities

System feeling down? Architect your enterprise apps for high availability

Businesses want to improve uptime, and optimizing every part of their technology stack for high availability is a significant step…

2 days ago

Thousands of MongoDB databases deleted in cyber-extortion attacks

MongoDB databases are getting deleted by the thousands. We've got a problem here, folks, and the blame goes to a…

4 days ago

Cisco patches serious flaw for ASR 9000 series routers

If your company employs the Cisco ASR 9000 series routers, you need to read on to find out about an…

4 weeks ago

eGobbler iOS malvertising campaign uses Chrome zero-day

A destructive malvertising campaign dubbed “eGobbler” leverages a zero-day exploit in the Chrome browser to attack iOS users.

1 month ago

It’s not just you: Avoiding third-party security vulnerabilities

Even a robust security strategy may leave an opening for attackers: Third-party security vulnerabilities are not often considered, but they…

2 months ago

Mozilla patches critical vulnerabilities in Thunderbird

If you use the popular email client Thunderbird, put on your patching shoes. Parent company Mozilla has released fixes for…

2 months ago

DHS warns of vulnerability in Medtronic medical devices

While patients should continue to use their Medtronic products as prescribed, they should also be aware of this newly found…

2 months ago

WordPress plugin Social Warfare removed due to major vulnerability

Do you use the popular WordPress Social Warfare plugin? You might want to stop for now — a major security…

2 months ago

Counter-Strike video game becomes a part of botnet

Counter-Strike players may be getting more than they bargained for. A new report says gamers of the online shooter may…

2 months ago

Microsoft: No more updates for OS using SHA-1 encryption

SHA-1 encryption was determined to be ineffective 14 years ago. Microsoft is finally taking steps to eliminate it once and…

3 months ago