Vulnerabilities | News, how-tos, features, reviews, and videos
Researchers identify methods that could allow attackers to bypass Ivanti integrity checks for recent attacks, perhaps surviving factory resets.
SAML authentication certificates, generated with tools other than dedicated cloud identity solutions, can be forged by hackers, according to a new proof of concept.
Vulnerabilities created by insecure code could lead to data leakage or corruption, and the burden is on Salesforce customers to mitigate.
Apple’s Shortcuts application has a bug that can allow attackers to remotely access sensitive data on Apple devices without user permission.
The vulnerability could allow attackers to bypass authentication or create a new admin account.
The threat actor exploits an XSS flaw in Roundcube webmail servers to target critical government infrastructure.
Hacker group Midnight Blizzard utilized password spray attacks that successfully compromised legacy Microsoft emails. Here’s how to reinforce your defenses against these intrusions.
The vulnerability allows attackers to bypass Microsoft's Office Protected View mode.
The new vulnerabilities were introduced by a fix for the previous Ivanti flaws, and customers are urged to install a new update.
Partitioning decisions in Windows were once mundane with little risk attached. Recent vulnerabilities that allow the bypassing of safety protocols highlight the need to pay more attention to them.