News

Bad code has resulted in $190 million being drained from Nomad's bridge, a cryptocurrency protocol that allows people to move crypto coins between different blockchains. In what's being called a ...
Hackers are exploiting Ethereum smart contracts to inject malware into popular NPM coding libraries, using packages to run ...
Security firm Secunia on Tuesday documented a possible exploit in Apple’s Safari Web browser that the company describes as “extremely critical.” Secunia calls the exploit Mac OS X “__MACOSX” ZIP ...
Researchers have published a proof-of-concept (PoC) exploit script demonstrating a chained remote code execution (RCE) vulnerability on Progress Telerik Report Servers. The Telerik Report Server is an ...
Hackers are adding malicious functionality to WinRAR self-extracting archives that contain harmless decoy files, allowing them to plant backdoors without triggering the security agent on the target ...
Attackers are mass-exploiting an anonymously disclosed vulnerability that makes it possible to take control of servers running vBulletin, one of the Internet’s most popular applications for website ...