Code-hooking techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit.
Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification.
A researcher finds he could earn millions of dollars by abusing the online phone verification systems used by Google, Microsoft, and Instagram
Ubuntu support forums users should be on the lookout for dodgy emails after the website's database of 2 million email addresses has been stolen.
Cisco Systems released patches this week for several vulnerabilities in its IOS software for networking devices and the Cisco and WebEx conferencing servers.
The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers.
Juniper Networks has fixed several vulnerabilities in the Junos operating system that's used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices.
The security team of the popular Drupal content management system worked with the maintainers of three third-party modules to fix critical vulnerabilities that could allow attackers to take over websites.
Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.
Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.
The latest version of the All in One SEO Pack plug-in for WordPress fixes a flaw that could be used to hijack the site's admin account.
Companies that develop enterprise applications download over 200,000 open-source components on average every year and one in every sixteen of those components has security vulnerabilities.
Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.
Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS encrypted keychain and give attackers control over the system.
A recently discovered vulnerability in a D-Link network camera exists in over 120 different D-Link products and allows attackers to remotely take over the affected devices.