The source code for Apple iOS iBoot secure bootloader has been leaked to GitHub, now we will try to understand…
Swisscom data breach - Telco company Swisscom confirmed it has suffered a data breach that affected roughly 800,000 of its customers,…
Joomla development team has released the Joomla 3.8.4 that addresses many issues, including an SQL injection bug and three cross-site scripting (XSS) flaws. Joomla development…
Researchers from Princeton University have developed an app called PinME to locate and track smartphone without using GPS. The research…
The Autosploit hacking tool was developed aiming to automate the compromising of remote hosts both by collecting automatically targets as well…
WordPress hacks are increasingly common. Whether it’s for malicious reasons, to harm a site or to just insert backlinks, WordPress…
Adobe rolled out an emergency patch that fixed two critical remote execution vulnerabilities, including the CVE-2018-4878 flaw exploited by North…
Security researcher Sean Dillon ported three NSA-linked exploits, EternalSynergy, EternalRomance, and EternalChampion, to the Metasploit platform. The security researcher at RiskSense Sean…
Researcher at Fidelis Cybersecurity devised a new technique that abuses X.509 Digital Certificates to establish a covert data exchange channel…
Security researchers at Qihoo 360's Netlab have spotted a new Android mining botnet that targets devices with ADB interface open. Security…
This website uses cookies.