Search Results
454 results
Your search is now limited to «Exploits and Security Flaws» expert search.
Ars Technica 03/22/2019 17:35
While developers have released patches for both exploited flaws, download figures indicate many vulnerable websites have yet to install the fixes.
More from Ars Technica:
SC Magazine 03/22/2019 15:07
Hackers are continuing to abuse the recently patched zero day vulnerability in the WordPress plugin Easy WP SMTP that if exploited can give attackers administrative control of a site.
More from SC Magazine: 03/22/2019 14:12
Veenstra also says in a more in-depth analysis of the zero-day that visitors of compromised websites "are subsequently redirected to a series of malicious sites, and their individual activity is tracked via cookies.
More from
Information Security Buzz 03/22/2019 12:30
It has been reported that a zero-day WordPress plugin has been exploited in the wild by at least two hacker groups. The vulnerability can be used to change site settings, create admin accounts to use as backdoors and then hijack traffic from the hacked sites. Satnam Narang, Senior Research Engineer at Tenable: “According to Web Technology Surveys (w3techs), WordPress …. The ISBuzz Post: This Post Zero-Day In WordPress SMTP Plugin Abused By Two Hacker Groups appeared first on Information Security Buzz .
More from Information Security Buzz:
Global Security 03/22/2019 10:00
This bulletin was written by Vigil@nce : SYNTHESIS OF THE VULNERABILITY Impacted products: Debian, Ubuntu. Severity: 2/4. Consequences: data reading, data creation/edition. Provenance: internet server. Confidence: confirmed by the editor (5/5). Creation date: 22/01/2019. DESCRIPTION OF THE VULNERABILITY An attacker can act as a Man-in-the-Middle on apt, in order to read or write data in the session, so a malicious package is (...). -. Security Vulnerability.
More from Global Security:
MacDailyNews 03/21/2019 12:03
Thursday, March 21, 2019 · 12:03 pm · No Comments “White-hat hackers at a security conference in Vancouver have found two zero-day Safari exploits, one of which allowed them to escalate their privileges to the point that they were able to completely take over the Mac,” Ben Lovejoy writes for 9to5Mac.
More from MacDailyNews:
AppleInsider 03/21/2019 11:50
Along with cash prizes, which totalled $240,000 in the first day alone, teams also receive the notebooks the exploits are demonstrated on, as well as "Master of Pwn" points for the overall competition.
More from AppleInsider:
SecurityWeek 03/21/2019 08:58
The specifically crafted TSAA packet is required to match the victim’s Node Number for successful exploitation,” Applied Risk said in its advisory.
More from SecurityWeek: 03/19/2019 08:31
We have released a press release where we inform about the patch of the security flaw and also give instructions how to remove the UNACEV2.DLL file in previous versions for users who are not interested in an upgrade," the spokesperson said.
More from

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications