Joomla 3.8.4 release addresses three XSS and SQL Injection vulnerabilities

8 years ago

Joomla development team has released the Joomla 3.8.4 that addresses many issues, including an SQL injection bug and three cross-site scripting (XSS) flaws. Joomla development…

Intel releases new Spectre security updates, currently only for Skylake chips

8 years ago

Intel is releasing new firmware updates that should address Spectre vulnerabilities CVE-2017-5715 for Skylake processors. Intel is releasing new firmware…

Meet PinME, A Brand New Attack To Track Smartphones With GPS Turned Off.

8 years ago

Researchers from Princeton University have developed an app called PinME to locate and track smartphone without using GPS. The research…

For the second time CISCO issues security patch to fix a critical vulnerability in CISCO ASA

8 years ago

Cisco has rolled out new security patches for a critical vulnerability, tracked as CVE-2018-0101, in its CISCO ASA (Adaptive Security…

Automated Hacking Tool Autosploit Cause Concerns Over Mass Exploitation

8 years ago

The Autosploit hacking tool was developed aiming to automate the compromising of remote hosts both by collecting automatically targets as well…

9 Tips to Prevent WordPress Hacks in this Dangerous Digital World

8 years ago

WordPress hacks are increasingly common. Whether it’s for malicious reasons, to harm a site or to just insert backlinks, WordPress…

Adobe rolled out an emergency patch that fixed CVE-2018-4878 flaw exploited by North Korea

8 years ago

Adobe rolled out an emergency patch that fixed two critical remote execution vulnerabilities, including the CVE-2018-4878 flaw exploited by North…

Researchers ported the NSA  EternalSynergy, EternalRomance, and EternalChampion to Metasploit

8 years ago

Security researcher Sean Dillon ported three NSA-linked exploits, EternalSynergy, EternalRomance, and EternalChampion, to the Metasploit platform. The security researcher at RiskSense Sean…

Crime ring linked to Luminosity RAT dismantled by an international law enforcement operation

8 years ago

The Europol’s European Cybercrime Centre along with the UK NSA disclosed the details of an international law enforcement operation that dismantled a…

Abusing X.509 Digital Certificates to establish a covert data exchange channel

8 years ago

Researcher at Fidelis Cybersecurity devised a new technique that abuses X.509 Digital Certificates to establish a covert data exchange channel…

This website uses cookies.