Information Security (Page 63)

Cybersecurity specialists report the detection of a severe vulnerability in Netgear devices for home and small business use that could be exploited in order to execute remote code with rootRead More →

Since the beginning of November, experts reported some cases of WordPress websites attacked with an alleged ransomware variant that turned out to be a fake threat were identified. Upon enteringRead More →

Cybersecurity specialists report that threat actors could track the online activity of Tor browser users to extract potentially sensitive information. This attack variant is known as Website Fingerprinting (WF). ThisRead More →

A few months ago a group of researchers discovered the ChaosDB vulnerability, a severe flaw in the Azure Cosmos DB database solution whose exploitation would allow threat actors to accessRead More →

The team in charge of GoCD announced the fix of three vulnerabilities that could be exploited in a chained manner to take full control of the underlying server. These flawsRead More →

In its latest security alert, Hewlett Packard Enterprise (HPE) confirmed that the data repositories of its Aruba Central software solution were tapped by threat actors, who could access sensitive information.Read More →