The HP Zero Day Initiative has disclosed four new zero-day vulnerabilities in Internet Explorer that can be exploited by attackers…
Netragard has shut down its exploit acquisition program, as a result of the clamorous data breach that the Italian firm…
A new critical vulnerability was discovered in the widely used OpenSSH software, hackers exploiting this flaw can run brute-force attacks…
Android devices, from Ice Cream version to Jelly Bean were p0wned with RCSAndroid RAT, one of the most professionally developed…
What will happen if hackers will hit critical infrastructure in the US, which will be the economic impact of a…
Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the "Attribution" for…
The Outpost24 team has identified several vulnerabilities that affect Joomla HelpDesk Pro extension, the flaws can lead to remote code…
Facebook releases query packs for finding possible malware infection, including the malicious exploits used by the Hacking Team to hack…
The popular hackers Charlie Miller and Chris Valasek have demonstrated how to hack a connected car remotely. Charlie Miller and…
MongoDB administrators have exposed something like 595.2 terabytes of data by using bad poor configurations, or un-patched versions of the…
This website uses cookies.