A severe vulnerability in Tor network was exploited by attackers to run denial of service attacks against two underground black…
A security researcher discovered that the improper configuration of some multicast DNS (mDNS) implementations could be used to amplify DDoS…
Security experts revealed that more than 100,000 home routers belonging to Australian households are still vulnerable to the PODDLE vulnerability.…
A Russian researcher has discovered a critical vulnerability in YouTube that could have been exploited by a hacker to delete…
A security researcher discovered a couple of security issues on GitHub platform explaining how it is possible to exploit them…
Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in…
Anonymous has posted a video message threatening Israel with “the electronic holocaust” which would “erase it from cyberspace” on next…
Modern maritime ships are considered a privileged target for hackers and pirates that are increasing their pressure on the Maritime…
Syrian Electronic Army hacked BlueHost, Hostgator, Justhost, FastDomain and HostMonstor companies because they hosted websites managed by terrorists. Syrian Electronic…
The New York Times reported that a group of hackers is interfering with the activities made through social media by…
This website uses cookies.