A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet, researchers said.
Threat actors are actively exploiting a vulnerability in an older version of Elasticsearch software in order to add distributed denial-of-service (DDoS) malware in Amazon Elastic Compute Cloud (EC2) services.Elasticsearch is an open source search server that can be used to look for various types of documents; its advantages include scalability, almost real-time search and support […]
A non-persistent cross-site scripting (XSS) vulnerability has been discovered in the Barracuda Spam and Virus Firewall web application, allowing a potential attacker to hijack session information or to execute non-persistent code.The product is designed as a complete email solution for organizations that want protection against email-borne threats and data leaks.The current vulnerability, discovered by the […]
Latest Comments