48 Hours to Patch: CISA Warns of Critical Ivanti Vulnerabilities
Cloudflare, a leading web infrastructure company, has successfully thwarted a massive distributed denial-of-service (DDoS) attack, which peaked at over 71…
In a major cybersecurity breach, hackers are targeting a two-year-old vulnerability in the VMware server software in a ransomware attack…
Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the…
How much do you know about network security? Do you have a high-level understanding of how it works? Do you…
OverRide is a tool help you to explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for…
A 0day (Zero-day) vulnerability is a software security flaw that is known to the software vendor but doesn’t have a…
The recently disclosed critical-impact bug in Kubernetes created strong ripples in the security space of the container-orchestration system. Now, multiple demo exploits exist and come…
Newest APPLE'S IOS 12.1 UPDATE doesn't just bring CPU throttling to the iPhone 8 and iPhone X, but also comes with a security flaw…
Security researchers have found even more capable features in VPNFilter, the sophisticated malware that infected 500,000 routers worldwide. Ascribed to…
Hundreds of thousands of security cameras are believed to be vulnerable to a zero-day vulnerability that could allow hackers to…
A security analyst has openly unveiled the zero-day vulnerability in the Microsoft's Windows OS that could enable a local user…
Adobe released security refresh prior to two basic remote code execution vulnerabilities affecting Adobe Photoshop CC for Microsoft Windows and…
Security researcher Man Yue Mo has disclosed a critical RCE vulnerability in the Apache Struts web appframework that could allow…
Security analysts at Kaspersky Labs have revealed another, complex malware that has been focusing on clients of a few Mexican…
A weakness in Microsoft's Active Directory Federation Services (ADFS) has been revealed, and can enable hackers to bypass mutli-factor authentication.…
A large number of vendors that have incorporated Bluetooth interfaces with their gadgets without requiring key approval are issuing fixes…
Microsoft Office is becoming a starting point for exploitation is not a challenge anyone wants to win. Tragically for Microsoft,…
Security researchers have found a Windows vulnerability that enables the attackers to execute arbitrary code – and Microsoft hasn't issued…
Privacy has a clearly defined price, and that is shown by the fact that last year certain companies offered up…
Sign in to your account