A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
The August Android Security Bulletin has been published, and it enumerates over 40 security risks that Google recently fixed in the Android OS.
A Controller Area Network (CAN) Bus standard vulnerability could impact the security of connected automobiles and other products.
Researchers from Kaspersky Lab recently discovered a new backdoor Trojan, called CowerSnail, that targets Windows computers.
A new open source vulnerability called Devil's Ivy could enable attackers to hijack security camera feeds and block legitimate users from accessing data.
A new scanning app found that more than 50,000 systems across the world are still vulnerable to the EternalBlue exploit, despite a patch being available.
Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.