The latest version of the PHP programming language provides support for improved password hashing and high-speed cryptography.
New attacks against unfinished installations of WordPress aim to give attackers admin access and the opportunity to run PHP code.
A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
Starting with the release of version 7.2 at the end of this year, the core of PHP will use Libsodium by default for routine cryptographical operations.
Security specialists have unearthed three PHP vulnerabilities that could have had serious consequences for organizations and consumers alike.
Webshells are dangerous in the hands of APT groups. According to IBM Managed Security Services (MSS), 95 percent of webshell attacks are written in PHP.
WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
LinkedIn spam emails exploit users' tendency to follow links from social networks, then steal sensitive data from their computers.