Bidao (BID) is building a decentralized Proof-of-Stake blockchain, which will also include a collateral backed stablecoin similar to the DAI stablecoin.
They claim to...
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-11647PUBLISHED: 2020-04-10In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector...
A security researcher found 10 vulnerabilities in the HP Support Assistant application shipped with every laptop the company makes, from the officially...
Microsoft recently patched a remote code execution vulnerability with Microsoft Exchange Server that allows an attacker to use an Exchange user account...
In this podcast, Prateek Bhajanka, VP of Product Management, Vulnerability Management, Detection and Response at Qualys, discusses how you can significantly accelerate an...
Mozilla releases Firefox version 74.0.1 to address two vulnerabilities exploited by threat actors in attacks in the wild, users should update their browsers...
Experts discovered an easily exploitable heap-based buffer overflow flaw, tracked as CVE-2020-10245, that exists in the CODESYS web server. A critical heap-based buffer...
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...
If you haven’t yet opted for automatic Apple security updates, it’s time to update your iDevices and software again.
The lightweight Apple security updates
The...