A publicly disclosed vulnerability in the MySQL database could allow attackers to completely compromise some servers
Thousands of publicly accessible FTP servers, including many Seagate network-attached storage devices, are being used by criminals to malware that mines cryptocurrency.
The Xen Project has fixed four vulnerabilities in its widely used virtualization software, two of which could allow malicious virtual machine administrators to take over host servers.
To push more websites to implement encryption and to better protect users, Google will start flagging plain HTTP connections as insecure in its popular Chrome browser.
A security researcher demonstrated that all it takes to steal an OS account's password hash from a Windows computer in a locked state, is to plug in a special USB device for a few seconds.
Google is now providing more information to website owners whose online properties are temporarily blocked as unsafe by its Safe Browsing technology in order to help them fix the identified problems faster.
Google released a large monthly batch of security patches for Android, fixing 55 vulnerabilities, eight of which are rated critical.
Security researchers have identified a new family of Linux rootkits that despite running from user mode, can be hard to detect and remove.
A bad malware signature caused Sophos antivirus products to detect a critical Windows file as malicious, preventing some users from accessing their computers.
Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case.
Microsoft has expanded its bug bounty programs to cover its open-source .NET Core and ASP.NET Core application development platforms.
Days after reports that a new ransomware attack was deleting files from web servers, security researchers determined that some of the affected servers were hacked via insecure deployments of the Redis database.
Adobe Systems released critical security patches for its ColdFusion application server which has been a target for hackers in the past.
A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.
A destructive ransomware program deletes files from web servers and asks administrators for money to return them, though it's not clear if attackers can actually deliver on this promise.