Cybercriminals have been stealing cookies and using a fraudulent WordPress API to impersonate users and take control of victims' browsing sessions.
Application security testing is the only way to prevent open source vulnerabilities from becoming a huge problem in the enterprise.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
As part of HackerOne's effort to improve open source security, the vulnerability disclosure firm made its bug bounty program available for free.
The Wireshark development team addressed dozens of vulnerabilities, segmentation flaws and bugs with the latest version of its network protocol analyzer.
DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.