Thousands of websites worldwide hijacked by a cryptocurrency mining code due to the hack of the popular Browsealoud plugin. A…
Hackers are exploiting the CVE-2018-0101 CISCO ASA flaw in attacks in the wild and a Proof-of-concept exploit code is available online. This…
According to a security advisory issued by Lenovo, two critical vulnerabilities in Broadcom chipsets affects at least 25 models of Lenovo ThinkPad. The affected…
The group of hackers known as 'fail0verflow' has discovered a vulnerability in the gaming console Nintendo Switch that could be…
Security expert Paulos Yibelo has discovered a vulnerability in Hotspot Shield VPN from AnchorFree that can expose locations of the…
A new PoS malware dubbed UDPoS appeared in the threat landscape and implements a novel and hard to detect technique to steal…
Security researchers Martin Rakhmanov from Trustwave conducted a one-year-study on the firmware running on Netgear routers and discovered vulnerabilities in a…
The source code for Apple iOS iBoot secure bootloader has been leaked to GitHub, now we will try to understand…
Swisscom data breach - Telco company Swisscom confirmed it has suffered a data breach that affected roughly 800,000 of its customers,…
Joomla development team has released the Joomla 3.8.4 that addresses many issues, including an SQL injection bug and three cross-site scripting (XSS) flaws. Joomla development…
This website uses cookies.