Breaking News

SQL Injection flaw in WordPress Plugin WP Statistics potentially exposed 300,000+ Sites

Security experts at Sucuri have discovered a SQL Injection vulnerability in WP Statistics, one of the most popular Wordpress plugins. Security…

9 years ago

Wikileaks – CIA developed OutlawCountry Malware to hack Linux systems

WikiLeaks released a new batch of documents that detail the CIA tool OutlawCountry used to remotely spy on computers running Linux operating…

9 years ago

Researcher released Eternal Blues, a free EternalBlue vulnerability scanner

The security researcher Elad Erez developed Eternal Blues, a free EternalBlue vulnerability scanner that could be used to assess networks.…

9 years ago

Cisco IOS Software is affected by RCE flaws that could allow full hack of the devices

Experts at CISCO discovered severe remote code execution vulnerabilities in Cisco IOS Software while conducting internal testing. Cisco warned users of…

9 years ago

NotPetya – Ukraine secret service announces a joint investigation with Europol, FBI, and NCA

Ukraine secret service announces joint investigation with Europol, FBI, and NCA to attribute the recent Notpetya massive attack. While security…

9 years ago

8tracks data leak exposed 18 million user accounts

The Music streaming service 8tracks suffered a major data leak, 18 million user accounts have been exposed and is available…

9 years ago

Microsoft issued Security fix for important flaw in Azure Active Directory Connect

Microsoft is warning sysadmins to check their Azure Active Directory Connect installs and patch them against an important Privilege Escalation…

9 years ago

UK.gov accidental data leak. Users’ details left publicly accessible on a third-party site

UK.gov leaves data dashboard users' details on publicly accessible on a third-party system. Users are urge to reset their password. Are…

9 years ago

Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware

According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware.…

9 years ago

A critical flaw allows hacking Linux machines with just a malicious DNS Response

A remote attacker can trigger the buffer overflow vulnerability to execute malicious code on affected Linux systems with just a malicious…

9 years ago

This website uses cookies.