Top

Tag: vulnerabilities


Mobile, Privacy protection, Threats & Malware, Vulnerabilities

Websites of U.S. Presidential Candidates Pose Security, Privacy Risks

March 27, 2020

Via: Security Week

The security firm has monitored 11 websites during September and December 2019, and discovered that 81% of them execute code from third-party entities unmanaged by the candidate teams. Moreover, 6% of the domains executing on candidate websites were linked to […]


Threats & Malware, Vulnerabilities

Attack Surface, Vulnerabilities Increase as Orgs Respond to COVID-19 Crisis

March 20, 2020

Via: Dark Reading

The speed at which organizations are being forced to respond to the unfolding COVID-19 health crisis could be leaving many of them vulnerable to attack by threat actors rushing to exploit the situation. Over the past few weeks security vendors […]


Cyber-crime, Malware, Phishing

2020 Tax Fraud Trends: How to Protect Yourself at Home and Work

March 17, 2020

Via: Security Intelligence

The tax season deadline in the U.S. is April 15, 2020, and that means scammers are officially on the prowl for unsuspecting tax fraud victims. Attackers are utilizing both time-tested and new techniques to collect tax information and personal data […]


Threats & Malware, Vulnerabilities

Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hack

March 13, 2020

Via: Security Affairs

The Popup Builder WordPress plugin is affected by security flaws that could be exploited by unauthenticated attackers to inject malicious JavaScript code into popups displayed on websites using it. More than 100,000 websites are exposed to cyber attacks that could […]


Threats & Malware, Vulnerabilities

XSS plugin vulnerabilities plague WordPress users

March 3, 2020

Via: Naked Security

Thousands of active WordPress plugins have been hit with a swathe of cross-site scripting (XSS) vulnerabilities that could give attackers complete control of sites. One of the affected plugins was designed to work with the popular WordPress ecommerce system WooCommerce. […]


Threats & Malware, Vulnerabilities

How Security Leaders at Starbucks and Microsoft Prepare for Breaches

March 3, 2020

Via: Dark Reading

In today’s increasingly crowded threat landscape, it can be difficult to determine which threats companies should prioritize. For those who are stuck, it’s helpful to consider what major organizations are worried about and the steps they’re taking to combat those […]


Hacker, Threats & Malware, Vulnerabilities

Hacker Earns $8,500 for Vulnerability in HackerOne Platform

February 27, 2020

Via: Security Week

Earlier this month, a hacker who uses the online moniker msdian7 discovered that a new feature introduced by the HackerOne bug bounty platform had resulted in a vulnerability that could have been exploited to obtain any HackerOne user’s email address. […]


Application security, Security, Threats & Malware, Vulnerabilities

APIs are becoming a major target for credential stuffing attacks

February 19, 2020

Via: CSO Online

New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even […]


Application security, Security, Threats & Malware, Vulnerabilities

MIT Researchers Find Vulnerabilities in Voatz Voting App

February 14, 2020

Via: Security Week

The application was used during the 2018 midterm elections in West Virginia, and was also deployed in elections in Denver, Oregon, and Utah. It was also used at the 2016 Massachusetts Democratic Convention and the 2016 Utah Republican Convention. Developed […]


Mobile, Mobile security, Threats & Malware, Vulnerabilities

Apple Patches Tens of Vulnerabilities in iOS, macOS Catalina

January 29, 2020

Via: Security Week

A total of 23 vulnerabilities were addressed in iOS 13.3.1 and iPadOS 13.3.1, now rolling out for iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation. The flaws impact components […]