| Security News from 'SecurityWeek' |
| Showing 'Security News from 'SecurityWeek'' from 91 to 100|
| |Vulnerabilities In Device Drivers From 20 Vendors Expose PCs To Persistent Malware
| |Vulnerability Has Been Lurking In Avaya Phones For 10 Years A security vulnerability discovered and patched 10 years ago has remained unaddressed in various Avaya phones until recently, McAfee security researchers have discovered.
| |Hidden Injection Flaws Found In BIG-IP Load Balancers In May 2019 (updated in June), F5 issued a security advisory about a potential injection issue in the Tool Command Language (TCL) as used with its BIG-IP load balancers. Load balancers are essential to ensure consistent web services in...
| |Repurposing Mac Malware Not Difficult, Researcher Shows Repurposing Mac malware is not a difficult task for someone with reverse-engineering skills, and it’s a far simpler approach compared to writing malware from scratch, a researcher has demonstrated.
| |Broadcom To Buy Symantec Enterprise Unit For $10.7 Billion Broadcom announced plans Thursday to buy the enterprise unit of cybersecurity firm Symantec Corp. for $10.7 billion in a move to further diversify the US semiconductor maker.
| |Hackers Can Use Rogue Engineering Stations To Target Siemens PLCs Malicious actors could use rogue engineering workstations to take control of Siemens programmable logic controllers (PLCs), and they can hide the attack from the engineer monitoring the system, researchers from two universities in Israel...
| |New Windows Process Injection Can Be Useful For Stealthy Malware
| |Privacy Platform Provider Securiti.ai Emerges From Stealth With $31 Million Funding In the past, data protection regulation has largely been concerned with preventing the theft of personal data. Security and security products have focused on preventing breaches -- no breach effectively meant no failure of data protection...
| |GM Cruise Releases Automated Firmware Security Analyzer To Open Source The growth of IoT devices has highlighted the difficulties in ensuring firmware security -- especially where the device and software are initially sourced from third parties, or developed under time pressures in-house. Now a new firmware...
| |Researchers Find Vulnerabilities In Boeing 787 Firmware Researchers from security firm IOActive have discovered a series of vulnerabilities and attacks that they believe could be possible on Boeings 787 Dreamliner.
| « Newer 5 6 7 8 9 10 11 12 13 14 Older » |