Multiple vulnerabilities and a hard-coded backdoor were discovered in Western Digital’s My Cloud network attached storage (NAS) devices that could allow remote attackers to gain unrestricted root access.
Microsoft, Linux, Google, and Apple started rolling out patches addressing design flaws in processor chips that security researchers named Meltdown and Spectre. What are they, and how can they affect users?
Security researchers at the University of Birmingham found that several banking apps were susceptible to man-in-the-middle (MitM) attacks through a vulnerability in the way they handle encrypted communications, which can let attackers steal credentials.
Several threat actors are actively exploiting CVE-2017-11882 to deliver a plethora of threats, including the information-stealing Loki, Pony/FAREIT, and a lockscreen with a ransom note that resembles Bad Rabbit's.
An attacker or cybercriminal’s toolbox would not be complete without vulnerabilities and exploits. We look back at some of 2017's most egregious security flaws, and their impact users and businesses.
A collection of vulnerabilities dubbed Mailsploit has put numerous users of popular mail clients at risk. The vulnerabilities allow attackers to spoof practically any email undetected.
Apple released a quick workaround for a bug that allows malicious actors to bypass the security of the macOS High Sierra 10.13 operating system and take full control of the computer.
Just in time for Black Friday: AliExpress was found to have a vulnerability that could have allowed attackers to display a fake coupon designed to phish sensitive information from shoppers.