News
Bad code has resulted in $190 million being drained from Nomad's bridge, a cryptocurrency protocol that allows people to move crypto coins between different blockchains. In what's being called a ...
Hackers are exploiting Ethereum smart contracts to inject malware into popular NPM coding libraries, using packages to run ...
Security firm Secunia on Tuesday documented a possible exploit in Apple’s Safari Web browser that the company describes as “extremely critical.” Secunia calls the exploit Mac OS X “__MACOSX” ZIP ...
Researchers have published a proof-of-concept (PoC) exploit script demonstrating a chained remote code execution (RCE) vulnerability on Progress Telerik Report Servers. The Telerik Report Server is an ...
Hackers are adding malicious functionality to WinRAR self-extracting archives that contain harmless decoy files, allowing them to plant backdoors without triggering the security agent on the target ...
Attackers are mass-exploiting an anonymously disclosed vulnerability that makes it possible to take control of servers running vBulletin, one of the Internet’s most popular applications for website ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results