A team of researchers claim attackers can exploit a vulnerability on Amazon's EC2 cloud storage platform in order to steal the cryptographic keys of other users. The researchers from Worcester Polytechnic...
Attackers could exploit vulnerabilities to upload malicious firmware onto the gateway and onto other ECUs
Incidents where malicious insiders scam incautious victims are on the rise
Publishing information about cyber threat groups can have unexpected consequences, says BAE Systems’ Saher Naumaan
Cisco fixes critical 'CDPwn' vulnerabilities that enabled the remote hijack of millions of routers and switches
CDPwn vulnerabilities affect the proprietary Cisco Discovery Protocol (CDP) enabled by default in almost all Cisco network devices
More than 2,000 servers in teh UK vulnerable to Citrix remote access security flaw