The Tianfu Cup 2019 International Cyber Security Competition has started, in two days white hat hackers will attempt to exploit…
The popular messaging platform WhatsApp made the headlines again, a new bug could be exploited by hackers to secretly install…
A working exploit for the checkm8 BootROM vulnerability is now available and security experts fear that threat actors could use…
Sergiy P. , the administrator of DDoS-for-hire services was sentenced to 13 months in prison, and additional three years of…
On Thursday, US authorities arrested two crooks charging them with stealing $550,000 in cryptocurrency from at least 10 victims using…
The computer network of Australian Parliament was hacked earlier this year, and hackers exfiltrated data from the computers of several…
Symantec addressed a local privilege escalation flaw that affects all Symantec Endpoint Protection client versions prior to 14.2 RU2. Symantec addressed a local privilege…
Security vulnerabilities in Qualcomm allow attackers to steal private data from hundreds of million millions of devices, especially Android smartphones.…
APT33, the Iran-linked APT group, has been using multiple layers of obfuscation to run a dozen live C2 servers for…
McAfee a vulnerability in its antivirus software that could allow an attacker to escalate privileges and execute code with SYSTEM…
This website uses cookies.