New collision attack on SHA-1 hashing algorithm
Attacks on the SHA-1 hashing algorithm just got a lot more dangerous last week with the discovery of the first-ever "chosen-prefix collision attack," a more practical version of t…
Attacks on the SHA-1 hashing algorithm just got a lot more dangerous last week with the discovery of the first-ever "chosen-prefix collision attack," a more practical version of t…
Mozilla has released an update today for Firefox (66.0.4) and Firefox ESR (60.6.2) that fixes the issue with an expired signing certificate that disabled add-ons for the vast majo…
Web management interface iDrac from Dell EMC contains several vulnerabilities. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.…
The Internet Systems Consortium (ISC) has released updates that address vulnerabilities in versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit th…
Multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files. If an attacker has persistent access to a VPN user's endpoint or e…