Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded…
Author: Lucian Constantin
Apache Struts 2 exploit used to install ransomware on servers
Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to…
Apache Struts 2 exploit allows ransomware on servers
Attackers are exploiting a vulnerability patched last month in the Apache Struts web development framework to…
F-Secure buys Little Flocker to combat macOS ransomware
With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has acquired…
F-Secure buys Little Flocker to combat macOS ransomware
With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided…
Critical Xen hypervisor flaw endangers virtualized environments
A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a…
Critical Xen hypervisor flaw endangers virtualized environments
A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a…
Apple fixes wireless-based remote code execution flaw in iOS
Apple released an iOS update Monday to fix a serious vulnerability that could allow attackers to…