< 1 min read - Security researchers discovered that students could abuse vulnerabilities in certain LMS plugins to access records and edit data.
2 min read - Security researchers observed an attack campaign that is targeting Linux servers to install samples of the new SpeakUp Trojan.
2 min read - The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
2 min read - New attacks against unfinished installations of WordPress aim to give attackers admin access and the opportunity to run PHP code.
2 min read - A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
2 min read - Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
2 min read - Security specialists have unearthed three PHP vulnerabilities that could have had serious consequences for organizations and consumers alike.
2 min read - Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.
3 min read - WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
4 min read - LinkedIn spam emails exploit users' tendency to follow links from social networks, then steal sensitive data from their computers.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.