Adobe fixes critical and important flaws in Flash Player and Experience Manager

9 years ago

Adobe has issued security updates to address critical and important security vulnerabilities in Flash Player and Experience Manager. The last Flash…

Jenkins patched a critical RCE flaw in its open source automation server

9 years ago

Jenkins developers fixed a critical RCE vulnerability in the popular open source automation server along with many other issues. Jenkins…

Microsoft fixes Microsoft Malware Protection Engine RCE vulnerability CVE-2017-0290 found by Google

9 years ago

Microsoft fixes the vulnerability in the Microsoft Malware Protection Engine (CVE-2017-0290) discovered just three days by Google experts. Last week…

The Supply chain of the HandBrake Mac software compromised to spread Proton malware

9 years ago

Maintainers of the HandBrake video transcoder are warning Mac users who recently downloaded the software that they may have been…

#MacronLeaks metadata suggests Russian threat actors behind Macron’s hack

9 years ago

#MacronLeaks - Experts discovered evidence suggesting Russian threat actors behind the hack of French presidential candidate Macron. Who are the…

Malwaresearch – A command line tool to find malware on Openmalware.org

9 years ago

Malwaresearch is a command line tool to find malware on Openmalware.org, it was developed to facilitate and speed up the process of…

Google Project Zero team the worst Windows RCE vulnerability in recent memory

9 years ago

Hackers at the Google Project Zero team have discovered another critical Windows RCE vulnerability, the worst Windows RCE in recent…

Android’s Vampire Bat Apps are listening to your life through ultrasonic beacons

9 years ago

Researchers at Technische Universitat Braunschweig published a study on 200+ Android mobile apps that are listening to your life through…

Operation WilySupply – Software remote update channel of the supply chain exploited as attack vector

9 years ago

Microsoft has recently uncovered an attack dubbed Operation WilySupply that leveraged the update mechanism of an unnamed software editing tool to compromise…

Fatboy Ransomware as a Service sets the ransom based on the victims’ location

9 years ago

Recently discovered Fatboy ransomware implements a dynamic method of setting the ransom amount based on the geographic location of the…

This website uses cookies.