SAP fixed a vulnerability affecting SAP MII can be used as a starting point of multi-stage attacks aiming to get…
Security Experts at ESET security firm discovered a new variant of a known trojan disguised as a Facebook Hacking Tool.…
In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized…
The T9000 backdoor discovered by PaloAlto Networks is able to infect victims' machines to steal files, take screengrabs, and records…
A hacker accessed an employee's email account at the Department of Justice and stole 200GB of files including records of…
The reuse of login credentials on Taobao exposed more than 20 million accounts on Alibaba's websites to attacks. According to…
Russian authorities raided offices of a Russian film distribution and production company as part of an operation against the Dyre…
A security expert discovered an authentication bypass vulnerability in both iOS devices that allows thwarting lock screen passcode. The security…
Google announced to have patched a number of critical vulnerabilities affecting the Nexus devices that lead to the complete hack…
Operators running websites based on the WordPress must be aware of a spike in the number of compromised platforms used…
This website uses cookies.