Attackers could exploit a vulnerability known as the Stack Clash bug to gain full root privileges, according to researchers at security firm Qualys.
Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
High-Tech Bridge released a report at InfoSecurity Europe 2017 highlighting some of the fastest growing application security threats to developers.
Developers of many enterprise apps potentially expose sensitive data by failing to properly secure the connection between back-end servers and the app.
The open source FreeRADIUS project recently patched a vulnerability that allowed malicious actors to bypass session authentication.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
Cybercriminals have been stealing cookies and using a fraudulent WordPress API to impersonate users and take control of victims' browsing sessions.
Application security testing is the only way to prevent open source vulnerabilities from becoming a huge problem in the enterprise.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.