A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…
Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…
A new hack leveraging on two distinct vulnerabilities could be exploited to open every Volkswagen vehicles that have been sold…
vBulletin forums need to be patched asap to avoid attackers to scan servers hosting the CMS and remotely execute arbitrary…
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are…
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows…
The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on…
Today I have interviewed Claudio Caracciolo (@holesec) one of the most renowned Security Professional that works like Chief Security Ambassador for…
This website uses cookies.