A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users…
A hacker hijacked over 150,000 Printers publicly exposed online to warn owners of cyber attacks. Recently a group of researchers…
HackerHouse researchers have discovered that media content protected by Digital Rights Management (DRM) can be used to uncloak Windows Tor…
The SQL Slammer worm, one of the most long-lived malware, now seems to be back online to compromise ancient SQL…
The web-based SCADA system Honeywell XL Web II Controller is affected by multiple flaws that can be remotely exploited to…
The group of hacktivists Anonymous hacked the popular Freedom Hosting II Dark Web hosting provider, a fifth of the .onion…
The Norwegian intelligence agency PST is one of the targets of spear phishing attacks launched by the Russian APT 29…
The US-CERT issued a security advisory to warn of a zero-day memory corruption vulnerability in the SMB (Server Message Block) protocol that…
According to the firm ProofPoint, Chinese state-sponsored actors continues to spy on military and aerospace organizations in Russia and Belarus.…
The experts at Cisco have discovered a critical authentication bypass vulnerability in the Cisco Prime Home during an internal security…
This website uses cookies.