The plugin, Social Warfare, is no longer listed after a cross site scripting flaw was found being exploited in the wild.
On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox.
The most serious vulnerabilities in Cisco’s 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the filesystem.
Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay.
Some of the flaws would allow remote code-execution.
Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.
The FBI’s crackdown on 15 DDoS-for-hire sites appears to have had an impact on DDoS attacks, the average size for which dropped 85 percent in the fourth quarter of 2018, a new report found.
The newest Mirai variant is targeting WePresent WiPG-1000 Wireless Presentation systems and LG Supersign TVs used by enterprises.
With wide deployment expected in the next decade, the driverless automobile landscape looks fraught – from road safety to data protection.
Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.