Vulnerable plugins plague the CMS website security landscape
Vulnerable plugins, extensions, and default settings are responsible for a high rate of website compromise, according to new research. Content management systems (CMSs) are...
Vulnerable plugins, extensions, and default settings are responsible for a high rate of website compromise, according to new research. Content management systems (CMSs) are...
HackerOne has acquired PullRequest, a code-review-as-a-service platform. The deal was announced on Thursday. No financial details have been disclosed. ZDNet Recommends The best security...
Microsoft on Thursday disclosed that it addressed a pair of issues with the Azure Database for PostgreSQL Flexible Server that could result in unauthorized...
India’s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily...
The United States, European Union, ex-EU member the United Kingdom, and 32 other nations have committed to the Declaration for the Future of the...
Written by Mary Jo Foley, Contributor Mary Jo Foley Contributor Mary Jo Foley has covered the tech industry for 30 years for a variety...
Vulnerability researchers at Microsoft are documenting the discovery of a pair of Linux privilege escalation flaws that could be chained together to plant dangerous...
Cloudflare on Wednesday disclosed that it acted to mitigate a 15.3 million request-per-second (RPS) distributed denial-of-service (DDoS) attack. The web infrastructure and website security...
A cyberespionage threat actor known for targeting a variety of critical infrastructure sectors in Africa, the Middle East, and the U.S. has been observed...
Google claims that it prevented 1.2 million bad applications from reaching Google Play in 2021, but cybercriminals are still finding ways to deliver malware...