Over 800 npm Packages Found with Discrepancies, 18 Exploitable to ‘Manifest Confusion’
March 21st, 2024 | 🕒
iSpeech.org Mar 21, 2024NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which
March 21st, 2024 | 🕒
iSpeech.org Mar 21, 2024NewsroomSoftware Security / Open Source New research has discovered over 800 packages in the npm registry which
November 1st, 2022 | 🕒
Powered by iSpeech Research shows an average of 51 network device misconfigurations were discovered in the last two years with
August 11th, 2022 | 🕒
https://www.ispeech.org/text.to.speech LAS VEGAS, Aug. 11, 2022 /PRNewswire/ -- Today Rezilion announced the availability of MI-X, a newly created open-source tool
May 5th, 2021 | 🕒
Powered by iSpeech Researchers at SentinelLabs say that they found various exploitable bugs in one of Dell’s Windows kernel drivers,
May 15th, 2020 | 🕒
iSpeech Dive Brief: Foreign bad actors are "routinely" exploiting unpatched VPNs in 2020, according to an alert issued by the
February 3rd, 2020 | 🕒
https://www.ispeech.org/text.to.speech Duo's mobile application, X-Ray, is used to assess vulnerabilities that exist in any Android device. But what is unusual
January 21st, 2020 | 🕒
TTS Demo Another threat to WordPress sites has surfaced online. Researchers have discovered some serious security vulnerabilities in the WP Database
November 13th, 2019 | 🕒
iSpeech.org Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 - Tong Lin & Luhai Chen, Intel To improve security, a
June 7th, 2019 | 🕒
iSpeech A critical vulnerability in Exim, the mail transfer agent (MTA) deployed on over half of all Internet-facing mail servers,
April 8th, 2019 | 🕒
TTS A recently patched SQL injection flaw affecting the popular open-source e-commerce platform Magento is being actively exploited by attackers,
July 30th, 2015 | 🕒
iSpeech.org The maintainers of BIND have patched a critical remotely exploitable vulnerability in the DNS software that can be used
June 13th, 2015 | 🕒
Powered by iSpeech A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password
May 29th, 2015 | 🕒
https://www.ispeech.org/text.to.speech Yasuo is a ruby script that scans for vulnerable 3rd-party web applications. While working on a network security assessment
March 17th, 2015 | 🕒
Text to Voice Router company D-Link has patched two separate vulnerabilities in its firmware that could be exploited remotely and
Gloss