Skip to content
vulnerabilities Page 3

vulnerabilities

Hackers actively exploit critical remote takeover vulnerabilities in D-Link devices

Hackers actively exploit critical remote takeover vulnerabilities in D-Link devices

Getty Images Hackers are actively exploiting a pair of recently discovered vulnerabilities to remotely commandeer network-attached storage devices manufactured by D-Link, researchers said Monday. Roughly 92,000 devices are vulnerable to the remote takeover exploits, which… 

Sequoia backs Coana to help companies prioritise vulnerabilities using ‘code aware’ software analysis

Sequoia backs Coana to help companies prioritise vulnerabilities using ‘code aware’ software analysis

Silicon Valley venture capital juggernaut Sequoia is backing a fledgling Danish startup to build a next-gen software composition analysis (SCA) tool, one that promises to help companies filter through the noise and identify vulnerabilities that…