#vulnerabilities

[ follow ]
#security
fromIndependent
3 weeks ago
UK news

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

fromIndependent
3 weeks ago
UK news

David W Higgins: No, we're not on the cusp of WWIII, but that doesn't mean I'd rule out the possibility of ration cards

#cybersecurity
Privacy technologies
fromNew York Post
2 months ago

Urgent warning to iPhone users - turn off popular feature and take these steps for safety

Apple's AirPlay feature, while convenient, has significant security flaws that could leave millions of devices vulnerable to hacking.
Apple
fromMail Online
2 months ago

Urgent warning to all 1.8 BILLION iPhone users: Turn off feature NOW

'AirBorne' vulnerabilities in AirPlay can allow remote takeovers, affecting billions of devices through zero-click attack methods.
Software development
fromInfoWorld
2 months ago

What software developers need to know about cybersecurity

Security must be integral to every developer's skill set.
Focus on mastering known vulnerabilities to enhance security responsiveness.
Key resources like OWASP Top 10 and MITRE are crucial for secure coding education.
Apple
fromWIRED
2 months ago

Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi

AirPlay vulnerabilities could allow hackers to spread malware across networks by exploiting connected devices.
Privacy technologies
fromNew York Post
2 months ago

Urgent warning to iPhone users - turn off popular feature and take these steps for safety

Apple's AirPlay feature, while convenient, has significant security flaws that could leave millions of devices vulnerable to hacking.
Apple
fromMail Online
2 months ago

Urgent warning to all 1.8 BILLION iPhone users: Turn off feature NOW

'AirBorne' vulnerabilities in AirPlay can allow remote takeovers, affecting billions of devices through zero-click attack methods.
Software development
fromInfoWorld
2 months ago

What software developers need to know about cybersecurity

Security must be integral to every developer's skill set.
Focus on mastering known vulnerabilities to enhance security responsiveness.
Key resources like OWASP Top 10 and MITRE are crucial for secure coding education.
Apple
fromWIRED
2 months ago

Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi

AirPlay vulnerabilities could allow hackers to spread malware across networks by exploiting connected devices.
#software-security
fromIT Pro
1 month ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromIT Pro
1 month ago
Software development

Shifting left might improve software security, but developers are becoming overwhelmed - communication barriers, tool sprawl, and 'vulnerability overload' is causing serious headaches for development teams

fromSecuritymagazine
1 week ago

Sudo Vulnerability Discovered, May Exposes Linux Systems

CVE-2025-32462 has received a lower CVSS score due to the conditions that are needed. Namely, successful execution would require someone to make a misconfiguration and deploy a Sudoers file with an incorrect host for this vulnerability to work.
Privacy professionals
fromThe Hacker News
1 week ago

AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs

Transient Scheduler Attacks (TSA) manifest as a speculative side channel in AMD CPUs, leveraging execution timing to potentially infer sensitive data from various contexts, resulting in leakage.
Privacy technologies
#ai-security
European startups
fromTechCrunch
2 months ago

Endor Labs, which builds tools to scan AI-generated code for vulnerabilities, lands $93M | TechCrunch

AI-generated code brings new security challenges, with many organizations facing issues frequently.
Endor Labs shifted focus to address vulnerabilities in AI-created code, leading to significant funding success.
European startups
fromTechCrunch
2 months ago

Endor Labs, which builds tools to scan AI-generated code for vulnerabilities, lands $93M | TechCrunch

AI-generated code brings new security challenges, with many organizations facing issues frequently.
Endor Labs shifted focus to address vulnerabilities in AI-created code, leading to significant funding success.
fromTechzine Global
3 weeks ago

Bluetooth leaks enable eavesdropping via headphones

The vulnerabilities allow malicious parties to eavesdrop via Bluetooth or steal sensitive data such as contact lists and call history.
Privacy professionals
fromForbes
3 months ago

Hackers Bypass Windows Defender Security - What You Need To Know

Bobby Cooke from IBM X-Force Red confirmed that the Microsoft Teams application was 'a viable WDAC bypass,' demonstrating significant security vulnerabilities in Windows Defender.
Information security
fromZero Day Initiative
1 month ago

Zero Day Initiative - The June 2025 Security Update Review

Adobe's June 2025 updates address 254 CVEs across multiple products, prioritizing those in Commerce and introducing a substantial fix for Experience Manager, despite no known exploits.
Web frameworks
[ Load more ]