The open source FreeRADIUS project recently patched a vulnerability that allowed malicious actors to bypass session authentication.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
Cybercriminals have been stealing cookies and using a fraudulent WordPress API to impersonate users and take control of victims' browsing sessions.
Application security testing is the only way to prevent open source vulnerabilities from becoming a huge problem in the enterprise.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.