Latest Vulnerabilities

XSS vulnerability in the HTML Data Processor for CKEditor 4.0

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web...

Unpatchable Flaw Affects All Intel CPUs Released in Last 5 Years

All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every hardware-enabled...

CentOS Web Panel Cross Site Scripting

Exploit author DKM annouce that CentOS Web Panel version 0.9.8.78 suffers from a persistent cross site scripting vulnerability.

Now Available: Exploit Code for the Kubernetes Flaw

The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security space of the container-orchestration system. Now, multiple demo exploits exist and come with easy-to-understand...

0day Vulnerability: How it Works?

A 0day (Zero-day) vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to...

FaceTime group call exploit hits Apple’s iOS 12.1

Newest APPLE'S IOS 12.1 UPDATE doesn't just bring CPU throttling to the iPhone 8 and iPhone X, but also comes with a security flaw that allows the lockscreen...

Windows 10 Bug Access All Files without User Knowledge

These days we read how Microsoft silently patched a bug in its Windows 10 OS with the October 2018 update (ver. 1809) that allowed Microsoft Store...

COVID-19: SentinelOne Offers Free Platform Access

As the world battles COVID-19, enterprises are coping with immediate work-from-home needs and the challenges of protection beyond the network perimeter, says...

XSS vulnerability in the HTML Data Processor for CKEditor 4.0

A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor 4.0 before 4.14 allows remote attackers to inject arbitrary web...

Cybercrime

Intruders stole client list from Clearview AI

Bad news for the controversial facial recognition startup Clearview AI, hackers gained “unauthorized access” to a list of all of its customers.

Blackout in Johannesburg Caused by Ransomware

A ransomware infection has been reported on the systems of one of South Africa’s leading power suppliers, specifically in the capital, Johannesburg....

Meet the LockerGoga Ransomware

The LockerGoga ransomware has been targeting industrial and manufacturing companies from the beginning of 2019Ransomware has long been the...

Stay on op - Ge the daily news in your inbox

Trending in Education

Cent OS Web Panel – Setup Name Servers

In this tutorial, you will learn how to change the domain Name Servers (nameservers) on CentOS Web Panel, also known as...

Python Show – Program Execution

In our first Python Show, we talked about what are the processes when you write a Python program. The Python interpreter reads your program...

Physical Security

Network Security

Security Tools

Photon: Light and Fast Web Crawler

Photon is a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target. 160 requests per second while extensive...