A team of researchers from the Korea Advanced Institute of Science and Technology Constitution (KAIST) discovered 36 vulnerabilities in the…
Facebook introduced new settings designed to make it easier for cyber experts to test the security of its mobile applications.…
Microsoft experts discovered privilege escalation and arbitrary code execution vulnerabilities in a tool from Huawei. Microsoft researchers discovered privilege escalation…
Operation ShadowHammer - ASUS is the last victim of a clamorous supply chain attack that delivered a backdoor to more…
Due to the growing demand for Android banking malware, threat actors continue using Anubis even is the creator has vanished.…
Cyber security expert and founder of Yoroi has published a new tool that could be used to spot APTs (Advanced…
Hackers took control of the emergency tornado alarms in Texas causing the panic, it has happened on March 12th, at…
It is a battle with no holds barred between T-Series and PewDiePie, their fans are spreading the PewDiePie ransomware to…
A Cross-Site Scripting (XSS) vulnerability in Social Warfare installations (v3.5.1 and v3.5.2) is actively exploited to add malicious redirects. The…
Pwn2Own 2019 Day 3 - Experts earned $35,000 and a Tesla Model 3 after hacking the vehicle’s web browser. Pwn2Own…
This website uses cookies.