Threat actors are launching a hacking campaign aimed at taking over tens of thousands of WordPress sites by exploiting critical…
Ghostcat flaw affects all versions of Apache Tomcat and could be exploited by hackers to read configuration files or install…
An interesting report published by RiskIQ on 2019 Mobile App Threat Landscape, lists the most dangerous mobile app store online.…
Cisco released security patches for 11 vulnerabilities in its products, including the Cisco UCS Manager, FXOS, and the NX-OS software.…
Bad news for the controversial facial recognition startup Clearview AI, hackers gained "unauthorized access" to a list of all of…
After three months from the first detection, the Lampion origin was identified. A webserver named “portaldasfinancas” is available in Turkey…
Hackers share SQL databases from unsecured AWS buckets, including the archive belonging to the BGR tech news site in India.…
Google revealed that the enhancements to its scanning system implemented in Gmail are boosting its detection capabilities. Google announced that…
Experts warn that hackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable in the attempt to exploit the…
A high-severity hardware vulnerability, dubbed Kr00k, in Wi-Fi chips manufactured by Broadcom and Cypress expose over a billion devices to…
This website uses cookies.